Schneider Electric EcoStruxure Power Operation (Update A)
EcoStruxure Power Operation 2022 CU6 and earlier, and 2024 CU1 and earlier, contain vulnerabilities in an embedded PostgreSQL database component (versions prior to 14.17) that allow remote code execution and unauthorized access. The vulnerabilities are exploitable without authentication and with low attack complexity. Affected versions include buffer overflows (CWE-787), code injection (CWE-95), and denial of service conditions (CWE-400, CWE-409). The embedded PostgreSQL is used for waveform analysis and ETAP simulation features. Successful exploitation could result in loss of system functionality or unauthorized access to system functions. The vendor has released a patch; however, older 2022 product lines (prior to CU7) do not have a patched version and require workarounds.
- Network access to the EcoStruxure Power Operation system's PostgreSQL port (5432 or configured alternate port)
- EPO system configured to accept database connections from the attacker's network (default or misconfigured exposure)
- Running affected EPO version (2022 CU6 or earlier, or 2024 CU1 or earlier)
/api/v1/advisories/a740c7c0-0357-47d6-9cff-7261fc870f2dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.