RemoteConnect and SCADAPack™ x70 Utilities
Plan Patch7.8SEVD-2025-014-06Jan 14, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Schneider Electric RemoteConnect and SCADAPack™ x70 Utilities software contain a deserialization vulnerability in how they process configuration project files. Untrusted serialized data in a crafted project file can be deserialized, leading to loss of confidentiality, integrity, and potential remote code execution on the compromised workstation. The RemoteConnect product is configuration software used to manage communications and operations for SCADAPack™ x70 devices, which are RTUs commonly deployed in energy infrastructure for telemetry and remote SCADA operations.
What this means
What could happen
An attacker with access to a RemoteConnect workstation could deserialize malicious data embedded in a project file, allowing remote code execution on the engineering workstation and potentially compromising connected SCADAPack™ x70 devices.
Who's at risk
Energy utilities and municipal authorities that use RemoteConnect to configure and manage SCADAPack™ x70 SCADA RTUs and telemetry systems. This affects engineering and control room staff who use RemoteConnect configuration software to maintain SCADA device settings, communication parameters, and operational logic.
How it could be exploited
An attacker crafts a malicious RemoteConnect project file containing serialized code and tricks an engineer into opening it. When the software deserializes the file contents, arbitrary code executes on the workstation with the user's privileges, potentially giving the attacker access to device configuration, credentials, and network connectivity to the SCADA environment.
Prerequisites
- User interaction required (engineer must open malicious project file)
- Access to RemoteConnect configuration software installation
- Ability to deliver malicious project file to an engineer (email, network share, USB drive)
Requires user interaction (opens project file)Can lead to remote code execution on engineering workstationNo patch available for Security Administrator componentAffects critical SCADA configuration software
Exploitability
Moderate exploit probability (EPSS 1.0%)
Affected products (2)
2 with fix
ProductAffected VersionsFix Status
RemoteConnect and SCADAPack™ x70 Utilities - RemoteConnect< R3.4.2R3.4.2 or later
RemoteConnect and SCADAPack™ x70 Utilities - Security Administrator All VersionsAll versionsR3.4.2 or later
Remediation & Mitigation
0/3
Do now
0/1WORKAROUNDDo not open RemoteConnect project files from untrusted sources or external networks; validate file origin before opening
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpgrade RemoteConnect to version R3.4.2 or later
Long-term hardening
0/1HARDENINGFor Security Administrator (all versions with no fix): isolate RemoteConnect workstations on a dedicated engineering network segment with restricted outbound access
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/10c6693d-bdb4-43b5-ac27-6955b8055cf5