OTPulse

Schneider Electric Ampla MES

Monitor6.7ICS-CERT ICSA-17-187-05Jul 6, 2017
Attack VectorLocal
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

Ampla MES versions 6.4 and prior contain cryptographic weaknesses (CWE-319: Cleartext Transmission of Sensitive Information, CWE-326: Inadequate Encryption Strength) that allow high-privilege attackers to read sensitive data or modify system configurations. An attacker with engineering or administrator credentials could exploit these weaknesses to access plant operational data or alter process settings without authorization. Schneider Electric recommends upgrading to version 6.5 or later.

What this means
What could happen
An attacker with high-privilege access to an Ampla MES system could read sensitive data or modify process configurations without detection. This could lead to unauthorized visibility into plant operations or incorrect process parameters being set.
Who's at risk
Energy sector operators using Schneider Electric Ampla MES version 6.4 or earlier for manufacturing execution and process monitoring should prioritize patching this system. This affects anyone relying on Ampla for recipe management, batch tracking, or production data visibility.
How it could be exploited
An attacker with engineering or administrator credentials on the MES system could exploit weak cryptographic protections (CWE-319, CWE-326) to gain unauthorized access to sensitive data or modify system settings. The attack requires local or direct system access with high-level privileges.
Prerequisites
  • High-privilege credentials (engineering or administrator account)
  • Local or direct network access to Ampla MES system
  • Knowledge of or ability to intercept system communications
Low complexity attackHigh-privilege access requiredWeak cryptographic controlsAffects data confidentiality and integrity
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
Ampla MES:≤ 6.46.5
Remediation & Mitigation
0/3
Do now
0/1
HARDENINGRestrict administrative and engineering access to Ampla MES to authorized personnel only and enforce strong password policies
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HOTFIXUpgrade Ampla MES to version 6.5 or later
Long-term hardening
0/1
HARDENINGSegment the MES network from general IT networks and monitor for unauthorized access attempts
↑↓ Navigate · Esc Close
API: /api/v1/advisories/e2c15595-399a-482a-9b93-e7b471f96222
Schneider Electric Ampla MES | CVSS 6.7 - OTPulse