Conext™ Combox
Schneider Electric Conext™ ComBox contains multiple vulnerabilities (clickjacking, cross-site request forgery, rate limiting bypass) that could allow an attacker to trick users into performing unintended actions. The ComBox is a web-based communication and monitoring device for Conext solar systems. The product was discontinued in January 2020 and is no longer supported, with no security patches available. Successful exploitation could lead to account takeover or manipulation of solar system settings and monitoring data.
- User or administrator must be logged into ComBox web interface
- Attacker must be able to host a malicious web page or send a crafted email the user will visit while logged into ComBox
- Network access to ComBox HTTP/HTTPS interface not required if social engineering is successful
Patching may require device reboot — plan for process interruption
/api/v1/advisories/a4746367-0b41-4365-8cf6-bb7a0feaea4eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.