Schneider Electric EcoStruxure Foxboro DCS
A deserialization vulnerability exists in EcoStruxure Foxboro DCS Control Software versions below CS8.1 on Foxboro DCS workstations and servers. An attacker who can supply manipulated external data files—such as configuration taglists, DirectAccess scripts, Galaxy backups, library files, or ASCII files—to a compromised workstation could trigger unsafe deserialization, potentially resulting in loss of confidentiality, integrity, and remote code execution on that system. The Core Services and runtime software components (FCPs, FDCs, FBMs) are not affected. The vulnerability is fixed in version CS8.1, which requires FX-V3 licenses and a workstation/server reboot to apply.
- Local or removable media access to a Foxboro DCS workstation or server running software version below CS8.1
- Ability to introduce malformed files (configuration taglists, backups, scripts, ASCII files) into the DCS system
- Engineer or administrative user context (users with elevated privileges are primary targets, but standard users may also be vulnerable if they accept untrusted files)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/575d8345-ff70-4082-8a0d-792c0787475dGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.