First published: Thu Sep 18 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric ClearSCADA | =2010-r3 | |
Schneider Electric ClearSCADA | =2010-r3.1 | |
Schneider Electric ClearSCADA | =2013-r1 | |
Schneider Electric ClearSCADA | =2013-r1.1 | |
Schneider Electric ClearSCADA | =2013-r1.1a | |
Schneider Electric ClearSCADA | =2013-r1.2 | |
Schneider Electric ClearSCADA | =2013-r2 | |
Schneider Electric EcoStruxure Geo SCADA Expert | =2013-r2.1 | |
Schneider Electric EcoStruxure Geo SCADA Expert | =2014-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5411 is rated as a moderate severity vulnerability due to its potential for exploitation through XSS attacks.
To fix CVE-2014-5411, update your Schneider Electric StruxureWare SCADA Expert ClearSCADA software to the latest patched version.
CVE-2014-5411 affects users of Schneider Electric StruxureWare SCADA Expert ClearSCADA versions between 2010 R3 and 2014 R1.
CVE-2014-5411 allows remote authenticated users to execute cross-site scripting attacks by injecting arbitrary web scripts or HTML.
CVE-2014-5411 is recognized as a common vulnerability, particularly in systems involving SCADA and industrial control technologies.