Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.
  • 3 May 2018 16:50

Tenable discovers 0-day vulnerabilities in Schneider Electric software affecting critical infrastructure

Vulnerability in Schneider Electric’s systems gives attackers free reign over IT and operational technology (OT) systems

Tenable, the Cyber Exposure company, recently discovered a critical remote code execution vulnerability in two Schneider Electric applications heavily used in manufacturing, oil and gas, water, automation, wind and solar power facilities in the U.S. If exploited, the vulnerability could give cybercriminals complete control of the underlying system. Attackers would also be able to use the compromised system to move laterally through the network, exposing additional systems to attack, including human-machine interface (HMI) clients. In a worst case scenario, attackers could use the vulnerability to disrupt or even cripple plant operations.

As underscored by the joint warning, OT systems have become high-value targets for cybercriminals around the world, which presents major challenges to human safety as well as ongoing productivity, uptime and efficiency. At the same time, the deployment of cybersecurity measures lag behind the digitisation of our critical infrastructure, resulting in an acute inability to accurately understand and represent cybersecurity risk at any given time — creating a massive Cyber Exposure gap.

The vulnerability discovered by Tenable Research impacts InduSoft Web Studio, an automation tool used to develop HMIs, supervisory control and data acquisition (SCADA) systems and embedded instrumentation solutions that connect OT with the Internet or corporate intranets, and InTouch Machine Edition, a scalable HMI client. This software is commonly deployed across several heavy industries, including manufacturing, oil and gas and automotive. With the growing adoption of distributed and remote monitoring in industrial environments, OT and IT are converging. As OT becomes increasingly connected and boundaryless, these safety-critical systems are increasingly vulnerable to cyberattacks.

“Digital transformation has made its way to critical infrastructure, connecting once-isolated systems to the outside world,” said Dave Cole, chief product officer, Tenable. “This Schneider Electric vulnerability is particularly concerning because of the potential access it grants cybercriminals looking to do serious damage to systems that quite literally power our communities. Tenable Research is focused on assessing, analysing and reducing the industry’s overall Cyber Exposure across the modern computing environment — be it cloud, IT, IoT or OT. Solving this growing problem requires us to come together as an industry and we commend Schneider Electric at the speed they released a patch to remediate this critical issue.”

A remote attacker without credentials can leverage this vulnerability to execute arbitrary code on vulnerable systems, potentially leading to full compromise of the InduSoft Web Studio or InTouch Machine Edition server machine. A threat actor can use the compromised machine to laterally move within the victim’s network and execute further attacks.

Tenable Research worked with the vendor to responsibly disclose the vulnerability and Schneider Electric has released patches for both affected systems. Given the widespread prevalence and market share of the affected software in the OT space, urgent attention and response from affected users is required.

For more information on the vulnerability, read the Tenable Research Advisory blog post here — https://www.tenable.com/blog/tenable-research-advisory-critical-schneider-electric-indusoft-web-studio-and-intouch-machine

Submit a media release

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release