Easergy Builder
Multiple vulnerabilities affecting Easergy Builder configuration tool related to cryptographic weaknesses (CWE-327), hardcoded credentials (CWE-798), improper data protection (CWE-312), insufficient input validation (CWE-20), and weak credential storage (CWE-521). These vulnerabilities allow attackers with network access to compromise the configuration tool and potentially modify electrical equipment settings or extract sensitive configuration data. Schneider Electric has released a fix in version 1.6.3.0.
- Network access to the engineering workstation running Easergy Builder
- Easergy Builder version 1.4.7.2 or earlier installed and in use
- Access to configuration files or network traffic containing configuration data
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5ab32e4e-7c18-4e2b-8d8f-f878dd474e07Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.