Security Experts:

Connect with us

Hi, what are you looking for?



Vulnerabilities Found in Schneider Electric SCADA Product Line

A total of three security holes have been identified in Schneider Electric’s StruxureWare SCADA Expert ClearSCADA products, ICS-CERT reported this week.

A total of three security holes have been identified in Schneider Electric’s StruxureWare SCADA Expert ClearSCADA products, ICS-CERT reported this week.

Schneider Electric SCADA Expert ClearSCADA solutions are Web-based systems deployed in industries such as energy, water and commercial facilities, mainly in the United States and Europe.

According to security advisories published by ICS-CERT and Schneider Electric, the flaws include an authentication bypass issue, a weak hashing algorithm and a cross-site scripting (XSS) vulnerability. Independent security researcher Aditya Sood, who has been credited for identifying two of the vulnerabilities, clarified for Kaspersky’s Threat Post that he actually reported a cross-site reference forgery (CSRF) flaw, not an XSS vulnerability.

By leveraging this vulnerability (CVE-2014-5411), an attacker could remotely shut down the ClearSCADA server by tricking a victim with system administrator privileges logged in via the WebX client interface to unknowingly execute arbitrary code, the vendor said.

Related Conference: 2014 ICS Cyber Security Conference – Register Now

“The ClearSCADA WebX Server configuration provides an option to ‘Allow database shutdown via WebX ‘, allowing system administration users logged in via WebX to remotely initiate a shutdown of the ClearSCADA Server. This functionality, in conjunction with the vulnerability to specific Web Cross-Site Scripting attacks, could be exploited to trick a user with system administration privileges logged in via the WebX client interface to unknowingly execute a remote shutdown of the ClearSCADA Server,” Schneider Electric wrote in its advisory.

The company has pointed out that customers who do not use the Web server are not affected, and ICS-CERT noted that the vulnerability can’t be exploited remotely and without user interaction. Organizations can protect themselves against such attacks by disabling the “Allow database shutdown via WebX feature.”

Another vulnerability has been catalogued as a remotely-exploitable “authentication bypass” (CVE-2014-5412) that can be leveraged to access sensitive system information.

“The guest user account within ClearSCADA installations is provided read access to the ClearSCADA database for the purpose of demonstration for new users. This default security configuration is not sufficiently secure to be adopted for systems placed into a production environment and can potentially expose sensitive system information to users without requiring login credentials,” ICS-CERT said in its advisory.

The third issue (CVE-2014-5413) stems from a weak hashing algorithm (MD5).

“The default self – signed security certificate provided with SCADA Expert ClearSCADA versions prior to September 2014 uses a deprecated and weak signing algorithm, allowing for decryption of SSL content and leakage of potentially sensitive system information,” Schneider said. “ClearSCADA customers who have obtained a valid security certificate from a certificate authority are not exposed to this vulnerability.”

There is currently no evidence that the vulnerabilities have been exploited in the wild.

Schneider Electric has promised to release service packs to address these security holes later this month. In order to address the weak hashing algorithm flaw, the company will release a standalone utility that can be utilized by customers who are currently using self-signed certificates to generate and deploy a new certificate signed with an SHA algorithm.

The Centeral Event of The Year2014 ICS Cyber Security Conference – Register Now


Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.


Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.