First published: Wed Jan 15 2014(Updated: )
DNP3Driver.exe in the DNP3 driver in Schneider Electric ClearSCADA 2010 R2 through 2010 R3.1 and SCADA Expert ClearSCADA 2013 R1 through 2013 R1.2 allows remote attackers to cause a denial of service (resource consumption) via IP packets containing errors that trigger event-journal messages.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric ClearSCADA | =2010-r2 | |
Schneider Electric ClearSCADA | =2010-r2.1 | |
Schneider Electric ClearSCADA | =2010-r3 | |
Schneider Electric ClearSCADA | =2010-r3.1 | |
Schneider Electric ClearSCADA | =2013-r1 | |
Schneider Electric ClearSCADA | =2013-r1.1 | |
Schneider Electric ClearSCADA | =2013-r1.1a | |
Schneider Electric ClearSCADA | =2013-r1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6142 has a CVSS score indicating it poses a high severity risk due to its potential for remote denial of service.
CVE-2013-6142 allows remote attackers to consume resources leading to a denial of service condition in affected ClearSCADA systems.
CVE-2013-6142 affects ClearSCADA versions 2010 R2 through R3.1 and 2013 R1 through R1.2.
Mitigation for CVE-2013-6142 involves applying vendor patches and implementing network security measures to filter malicious IP packets.
Yes, there is an official advisory from ICS-CERT regarding CVE-2013-6142, providing details on the vulnerability and its implications.