Schneider Electric EcoStruxure
Reflected cross-site scripting (XSS) vulnerability in Schneider Electric EcoStruxure Power Monitoring Expert (PME), Power Operation (EPO), and Power SCADA Operation (PSO) software. An authenticated attacker can inject malicious web code that executes in the browsers of other users viewing the same pages, potentially leading to unauthorized access to power system information or unintended control operations. Schneider Electric has released patches for PME 2021 (CU2), PME 2022, EPO 2022 (CU5), and EPO 2021 (CU3 Hotfix 3). No fixes are available for PME 2020 CU3, EPO 2022 Advanced Reporting module, EPO 2021 Advanced Reporting module, or PSO 2020 Advanced Reporting module.
- Valid user account credentials for the EcoStruxure application
- Network access to the EcoStruxure web server (typically HTTP/HTTPS port)
- User interaction: another user must view a page containing the injected malicious code
Patching may require device reboot — plan for process interruption
/api/v1/advisories/62293477-ff8e-47bf-b7fe-e4b0cb04bfccGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.