Schneider Electric Saitel DR & Saitel DP Remote Terminal Unit
Schneider Electric Saitel DR and Saitel DP RTUs contain a privilege escalation vulnerability (CWE-269) related to insecure configuration file permissions and daemon access control. The vulnerability allows local/console attackers to execute arbitrary code and escalate privileges, potentially resulting in denial of service, loss of confidentiality, and integrity compromise of the device. The Saitel DR RTU is vulnerable in versions before 11.06.30. The Saitel DP RTU versions before 11.06.34 are affected, and no fix is currently planned. Successful exploitation requires physical or console access to the device; remote exploitation is not possible.
- Physical or console access to the RTU
- Ability to interact with privileged daemons or configuration files on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/13b92cf5-ef0f-4715-bf3d-f55c175bc87dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.