Security Experts:

Schneider Electric Patches Flaw in Motion USA Website

Energy management giant Schneider Electric has patched a cross-site scripting (XSS) vulnerability on one of its websites.

Elastica researcher Aditya Sood, who recently disclosed the existence of vulnerabilities in the Supervisory Control and Data Acquisition (SCADA) products of several major vendors, reported identifying a reflected XSS flaw on Schneider Electric’s website. is a site where users can order products from Schneider Electric Motion USA, a Schneider Electric subsidiary that designs, manufactures and supplies motors, drives, and controls used in areas such as robotics, medical instruments, semiconductor manufacturing, laboratory automation, packaging, and biomedical.

An advisory provided by Sood to SecurityWeek shows that the developers of the e-order website failed to sanitize the input passed by remote users in an HTTP request, allowing an attacker to execute arbitrary JavaScript code in the context of the web application.

According to the researcher, an attacker could have executed JavaScript code designed to steal cookies and session identifiers in an effort to hijack accounts. Malicious actors could have also leveraged the XSS vulnerability to take users to phishing sites or display phishing pages in an iframe within the legitimate website.

Schneider Electric Motion USA XSS 

Sood noted that an attacker could have also forced users to download malicious code onto their computers.

Schneider Electric patched the XSS vulnerability on within a few weeks after it was reported by Sood. The company told the researcher that it has taken this opportunity to bring third-party service providers up to speed on secure development practices.

While this particular issue affected one of Schneider Electric’s websites, the company’s industrial control system (ICS) products are also often found to be plagued by vulnerabilities. A report released in September by threat intelligence firm Recorded Future showed that roughly 20 flaws affecting Schneider ICS products have been disclosed annually since 2011.

The Recorded Future report shows that Schneider and Siemens are the companies with the highest number of vulnerabilities disclosed each year, which is not surprising given the popularity of their products.

Schneider Electric is one of the ICS vendors whose products were analyzed earlier this year by Sood. Since the vulnerabilities were previously reported by a different researcher, Schneider managed to develop a patch within a month after Sood disclosed his findings at the DEF CON conference in Las Vegas.

Related: Learn More at the ICS Cyber Security Conference

view counter
Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.