OTPulse

Schneider Electric EcoStruxure Operator Terminal Expert

Plan Patch7.8ICS-CERT ICSA-23-180-02Jun 29, 2023
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary

EcoStruxure Operator Terminal Expert versions 3.3 SP1 and earlier contain a code injection vulnerability (CWE-94) that allows arbitrary code execution on affected machines. An attacker with local access or who can trick a user into opening a malicious file could execute commands and access sensitive information. The vulnerability is not remotely exploitable. Schneider Electric has released version 3.4 as a fix.

What this means
What could happen
An attacker with local access could execute arbitrary code on the Operator Terminal Expert machine, potentially compromising the integrity of control commands and gaining access to sensitive operational data. This could allow manipulation of process parameters or theft of system configuration information.
Who's at risk
Energy sector operators who use Schneider Electric EcoStruxure Operator Terminal Expert (version 3.3 SP1 or earlier) as part of their SCADA or industrial control system human-machine interface should prioritize updating this software. This affects control room workstations and engineering terminals that manage generation, transmission, or distribution assets.
How it could be exploited
An attacker needs local access to the machine running EcoStruxure Operator Terminal Expert, typically through social engineering (malicious email attachment or link) or physical access. Once code execution is achieved, the attacker can run arbitrary commands with the privilege level of the application or logged-in user.
Prerequisites
  • Local access to the Operator Terminal Expert machine
  • User interaction required (e.g., clicking a link or opening a file)
  • EcoStruxure Operator Terminal Expert version 3.3 SP1 or earlier
Arbitrary code execution capabilityAffects control system HMI/operator interfaceRequires user interaction (social engineering vector)Low complexity exploitation
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
EcoStruxure Operator Terminal Expert: <= 3.3 SP1≤ 3.3 SP13.4
Remediation & Mitigation
0/5
Do now
0/1
WORKAROUNDImplement email filtering and user awareness training to reduce risk of social engineering attacks that could deliver malicious files
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HOTFIXUpdate EcoStruxure Operator Terminal Expert to version 3.4 or later
HARDENINGTest patches in a development environment before deploying to production systems; maintain backups before patching
Long-term hardening
0/2
HARDENINGRestrict local access to Operator Terminal Expert machines through physical security controls and endpoint access policies
HARDENINGIsolate Operator Terminal Expert machines from the business network and Internet
↑↓ Navigate · Esc Close
API: /api/v1/advisories/91713f4e-149a-4727-8cb9-9561d37a955b
Schneider Electric EcoStruxure Operator Terminal Expert | CVSS 7.8 - OTPulse