ICSA-19-295-01_Schneider Electric ProClima
A vulnerability in Schneider Electric ProClima (all versions prior to 8.0.0) allows remote code execution without authentication. The vulnerability was reported by multiple security researchers including Haojun Hou, Kushal Arvind Shah of Fortinet, Yongjun Liu of NSFOCUS, and Telus. The issue permits an attacker on the network to execute arbitrary commands on ProClima systems, potentially affecting building climate control and safety operations. No known public exploits exist at the time of this advisory, but the vulnerability has a CVSS score of 9.8 (critical) and an EPSS exploit probability of 12.5%.
- Network access to ProClima device or the network segment it resides on
- ProClima version prior to 8.0.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/274f9597-d60c-4da1-a763-42493731b8c4Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.