Apache Log4j Vulnerabilities (Log4Shell)
Schneider Electric products are vulnerable to Apache Log4j vulnerabilities, including CVE-2021-44228 (Log4Shell). Affected products include APC PowerChute Business Edition, APC PowerChute Network Shutdown, EcoStruxure IT Gateway, Eurotherm Data Reviewer, and Harmony Configurator. The vulnerability allows remote code execution through malicious Log4j expressions. Schneider Electric has released patches for most products (updated to Log4j 2.17), with automatic deployment mentioned for some components (SDK-UMS, Select and Config DATA, SNC-API, SNC-CMM, SNC-SEMTECH). Harmony Configurator has no fix planned.
- Network access to the affected application (management interface, API, or log input)
- No credentials required in most cases—malicious input can be sent via HTTP requests, network messages, or API calls
/api/v1/advisories/a26a1c54-346a-4caf-aab5-c40a3c01873eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.