Schneider Electric EcoStruxure and SCADAPack
A path traversal or code injection vulnerability in Schneider Electric EcoStruxure Control Expert, EcoStruxure Process Expert, and SCADAPack RemoteConnect allows code execution when a user opens a specially crafted project file. The vulnerability affects all current versions. Schneider Electric has not released a patch and is only establishing a future remediation plan. The vendor recommends securing project files, using checksums to verify integrity, running software with minimal privileges, and hardening workstations.
- Access to project files (obtained through file theft, interception, or social engineering)
- Engineer must open the compromised file on a workstation running the affected software
- Ideally, the engineer should have administrator privileges for broader impact
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cb7be272-fc46-4f38-9264-0ade4558735aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.