Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Schneider Patches RCE Flaws in ProClima Software

Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.

Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.

ProClima is a thermal calculation software designed to help organizations determine the optimal thermal management settings for their electrical and electronic devices based on factors such as temperature, humidity and sun radiation. The product is mainly deployed in the United States and Europe in sectors such as energy, critical manufacturing and commercial facilities.

ProClima version 6.2 resolves remote code execution (RCE) vulnerabilities introduced via ActiveX controls associated with the Internet Explorer web browser. The flaws, assigned a CVSS score of 6.8 (medium severity), affect all versions of the software prior to 6.2, Schneider Electric said in its advisory.

In order to mitigate the ActiveX attack vector, Schneider’s patch disconnects the software from Internet Explorer and requires use with either Mozilla Firefox or Google Chrome.

The vulnerabilities have been reported by Ariele Caltabiano and Fritz Sands via the Zero Day Initiative (ZDI). The company has thanked Caltabiano and Sands for their cooperation during the disclosure process.

“Schneider Electric takes these security and safety issues very seriously and we have devoted resources to immediately investigate and address these issues. We believe it is critical to consider the whole picture, including safety, security and reliability. Any patches/solutions/mitigations we release are tested to support both a safe and secure deployment,” Schneider said.

Caltabiano and two other researchers were credited last year by Schneider for reporting a total of five command injection vulnerabilities in ProClima.

A report published earlier this year by Recorded Future showed that Siemens and Schneider Electric are the ICS vendors with the largest number of vulnerabilities reported over the past years. These companies also top the chart when it comes to available exploits, but none of the exploits identified in the study target ProClima.

Advertisement. Scroll to continue reading.

Related Reading: Schneider Electric Patches Flaw in Motion USA Website

Related Reading: ICS Flaw Disclosures at High Levels Since Stuxnet Attack

Learn More at the ICS Cyber Security Conference

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

ICS/OT

The overall effect of current global geopolitical conditions is that nation states have a greater incentive to target the ICS/OT of critical industries, while...

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

ICS/OT

Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or...

ICS/OT

Mandiant's Chief analyst urges critical infrastructure defenders to work on finding and removing traces of Volt Typhoon, a Chinese government-backed hacking team caught in...

Cybercrime

Energy giants Schneider Electric and Siemens Energy confirm being targeted by the Cl0p ransomware group in the campaign exploiting a MOVEit zero-day.

ICS/OT

Wago has patched critical vulnerabilities that can allow hackers to take complete control of its programmable logic controllers (PLCs).

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.