Schneider Electric SESU
Schneider Electric Software Update (SESU) versions 2.3.0 through 2.5.1 contain a vulnerability that could allow an attacker with local access to configure the software to establish an unintended connection between an internal control network and an external network. This vulnerability could bypass network isolation protections that keep control systems separated from the internet and business networks. The vulnerability is not remotely exploitable and requires physical or local access to the workstation running SESU. Schneider Electric recommends updating to a newer version of SESU and implementing network segmentation and physical access controls.
- Local access to a workstation running SESU v2.3.0 through v2.5.1
- User-level or administrative credentials on the host system
- SESU configured as a managed product within the application
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e45747dd-cb1f-4ec4-8f0d-a2b4b8d0014aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.