Home Security Schneider patches critical flaw in industrial software

Security firm Tenable has discovered a critical vulnerability in software made by Schneider Electric that is used in manufacturing, oil and gas, water, automation, wind and solar power facilities in the US.

A stack-based buffer overflow was found in InduSoft Web Studio, an automation tool that is used to develop human-machine interfaces, supervisory control and data acquisition systems and embedded instrumentation solutions that connect operational technology with the Internet or corporate intranets, and InTouch Machine Edition, a scalable HMI client.

In its advisory, Schneider Electric said: "InduSoft Web Studio and InTouch Machine Edition provide the capability for an HMI client to read, write tags and monitor alarms and events.

"A remote malicious entity could send a carefully crafted packet to exploit a stack-based buffer overflow vulnerability during tag, alarm, or event-related actions such as read and write, with potential for code to be executed.

"The code would be executed under high privileges and could lead to a complete compromise of the InduSoft Web Studio or InTouch Machine Edition server machine."

InduSoft Web Studio is deployed across several heavy industries, including manufacturing, oil and gas and automotive.

In a statement, Tenable said given the increase in distributed and remote monitoring in industrial environments, operational technology and IT were converging.

It said as OT became increasingly connected and lacked boundaries, these safety-critical systems were increasingly vulnerable to cyber attacks.

“Digital transformation has made its way to critical infrastructure, connecting once-isolated systems to the outside world,” said Dave Cole, chief product officer, Tenable.

“This Schneider Electric vulnerability is particularly concerning because of the potential access it grants cyber criminals looking to do serious damage to systems that quite literally power our communities."

FREE SEMINAR

Site24x7 Seminars

Deliver Better User Experience in Today's Era of Digital Transformation

Some IT problems are better solved from the cloud

Join us as we discuss how DevOps in combination with AIOps can assure a seamless user experience, and assist you in monitoring all your individual IT components—including your websites, services, network infrastructure, and private or public clouds—from a single, cloud-based dashboard.

Sydney 7th May 2019

Melbourne 09 May 2019

Don’t miss out! Register Today!

REGISTER HERE!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

Sam Varghese

website statistics

Sam Varghese has been writing for iTWire since 2006, a year after the sitecame into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

 

Popular News

 

Telecommunications

 

Guest Opinion

 

Sponsored News

 

 

 

 

Connect