Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.
ProClima is a thermal calculation software designed to help organizations determine the optimal thermal management settings for their electrical and electronic devices based on factors such as temperature, humidity and sun radiation. The product is mainly deployed in the United States and Europe in sectors such as energy, critical manufacturing and commercial facilities.
ProClima version 6.2 resolves remote code execution (RCE) vulnerabilities introduced via ActiveX controls associated with the Internet Explorer web browser. The flaws, assigned a CVSS score of 6.8 (medium severity), affect all versions of the software prior to 6.2, Schneider Electric said in its advisory.
In order to mitigate the ActiveX attack vector, Schneider’s patch disconnects the software from Internet Explorer and requires use with either Mozilla Firefox or Google Chrome.
The vulnerabilities have been reported by Ariele Caltabiano and Fritz Sands via the Zero Day Initiative (ZDI). The company has thanked Caltabiano and Sands for their cooperation during the disclosure process.
“Schneider Electric takes these security and safety issues very seriously and we have devoted resources to immediately investigate and address these issues. We believe it is critical to consider the whole picture, including safety, security and reliability. Any patches/solutions/mitigations we release are tested to support both a safe and secure deployment,” Schneider said.
Caltabiano and two other researchers were credited last year by Schneider for reporting a total of five command injection vulnerabilities in ProClima.
A report published earlier this year by Recorded Future showed that Siemens and Schneider Electric are the ICS vendors with the largest number of vulnerabilities reported over the past years. These companies also top the chart when it comes to available exploits, but none of the exploits identified in the study target ProClima.
Related Reading: Schneider Electric Patches Flaw in Motion USA Website
Related Reading: ICS Flaw Disclosures at High Levels Since Stuxnet Attack
Learn More at the ICS Cyber Security Conference

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- Vulnerabilities in Honda eCommerce Platform Exposed Customer, Dealer Data
- Barracuda Urges Customers to Replace Hacked Email Security Appliances
- Google Patches Third Chrome Zero-Day of 2023
- ChatGPT Hallucinations Can Be Exploited to Distribute Malicious Code Packages
- AntChain, Intel Create New Privacy-Preserving Computing Platform for AI Training
- Several Major Organizations Confirm Being Impacted by MOVEit Attack
Latest News
- In Other News: AI Regulation, Layoffs, US Aerospace Attacks, Post-Quantum Encryption
- Blackpoint Raises $190 Million to Help MSPs Combat Cyber Threats
- Google Introduces SAIF, a Framework for Secure AI Development and Use
- ‘Asylum Ambuscade’ Group Hit Thousands in Cybercrime, Espionage Campaigns
- Evidence Suggests Ransomware Group Knew About MOVEit Zero-Day Since 2021
- SaaS Ransomware Attack Hit Sharepoint Online Without Using a Compromised Endpoint
- Google Cloud Now Offering $1 Million Cryptomining Protection
- Democrats and Republicans Are Skeptical of US Spying Practices, an AP-NORC Poll Finds
