Schneider Electric Authenticated Communication Risk Vulnerability
Schneider Electric engineering and runtime software products contain an authenticated communication risk in which the authentication mechanism may fail to properly validate communications between engineering workstations and control systems. The affected products include Unity Pro (all versions 5.0 through 6.1), Vijeo Designer (versions 5.0 through 6.1), SoMachine (v1.2.1), SESU (versions 1.0–1.1), IDS (versions 1.0–2.0), PowerSuite (v2.5), Web Gate Client Files (v5.1), and multiple Smart Widget components. An attacker with valid engineering credentials could exploit this flaw to bypass authentication checks and perform unauthorized actions on affected systems.
- Valid engineering workstation credentials
- Network access to the affected Schneider Electric software or device
- Affected Schneider Electric product installed (engineering station or runtime)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/23619687-9d7c-4973-adf4-f92600eef98fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.