ICS/OT

Schneider Patches RCE Flaws in ProClima Software

Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.

<p><strong><span><span>Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.</span></span></strong></p>

Schneider Electric has released an update for its ProClima product to address a series of vulnerabilities that could allow a remote attacker to execute unauthorized code.

ProClima is a thermal calculation software designed to help organizations determine the optimal thermal management settings for their electrical and electronic devices based on factors such as temperature, humidity and sun radiation. The product is mainly deployed in the United States and Europe in sectors such as energy, critical manufacturing and commercial facilities.

ProClima version 6.2 resolves remote code execution (RCE) vulnerabilities introduced via ActiveX controls associated with the Internet Explorer web browser. The flaws, assigned a CVSS score of 6.8 (medium severity), affect all versions of the software prior to 6.2, Schneider Electric said in its advisory.

In order to mitigate the ActiveX attack vector, Schneider’s patch disconnects the software from Internet Explorer and requires use with either Mozilla Firefox or Google Chrome.

The vulnerabilities have been reported by Ariele Caltabiano and Fritz Sands via the Zero Day Initiative (ZDI). The company has thanked Caltabiano and Sands for their cooperation during the disclosure process.

“Schneider Electric takes these security and safety issues very seriously and we have devoted resources to immediately investigate and address these issues. We believe it is critical to consider the whole picture, including safety, security and reliability. Any patches/solutions/mitigations we release are tested to support both a safe and secure deployment,” Schneider said.

Caltabiano and two other researchers were credited last year by Schneider for reporting a total of five command injection vulnerabilities in ProClima.

A report published earlier this year by Recorded Future showed that Siemens and Schneider Electric are the ICS vendors with the largest number of vulnerabilities reported over the past years. These companies also top the chart when it comes to available exploits, but none of the exploits identified in the study target ProClima.

Advertisement. Scroll to continue reading.

Related Reading: Schneider Electric Patches Flaw in Motion USA Website

Related Reading: ICS Flaw Disclosures at High Levels Since Stuxnet Attack

Learn More at the ICS Cyber Security Conference

Related Content

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version