First published: Thu Sep 18 2014(Updated: )
Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorithm for an X.509 certificate, which makes it easier for remote attackers to spoof servers via a cryptographic attack against this algorithm.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric ClearSCADA | =2010-r3 | |
Schneider Electric ClearSCADA | =2010-r3.1 | |
Schneider Electric ClearSCADA | =2013-r1 | |
Schneider Electric ClearSCADA | =2013-r1.1 | |
Schneider Electric ClearSCADA | =2013-r1.1a | |
Schneider Electric ClearSCADA | =2013-r1.2 | |
Schneider Electric ClearSCADA | =2013-r2 | |
Schneider Electric EcoStruxure Geo SCADA Expert | =2013-r2.1 | |
Schneider Electric EcoStruxure Geo SCADA Expert | =2014-r1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-5413 is rated as a high severity vulnerability due to its potential to allow remote attackers to spoof servers.
To fix CVE-2014-5413, it is recommended to upgrade to a version of ClearSCADA that does not use the MD5 algorithm for X.509 certificates.
CVE-2014-5413 affects Schneider Electric StruxureWare SCADA Expert ClearSCADA versions from 2010 R3 to 2014 R1.
CVE-2014-5413 allows attackers to perform cryptographic attacks that can lead to server spoofing.
Yes, CVE-2014-5413 is specifically problematic due to the use of the MD5 algorithm, which is known to be weak.