First published: Mon May 14 2018(Updated: )
In Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior, an attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets to the ClearSCADA server that can cause the ClearSCADA server process and ClearSCADA communications driver processes to terminate. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Aveva Clearscada | <=2010 | |
Schneider-electric Clearscada | =2014-r1 | |
Schneider-electric Clearscada | =2014-r1.1 | |
Schneider-electric Clearscada | =2015-r1 | |
Schneider-electric Clearscada | =2015-r2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6021 is a vulnerability in Schneider Electric ClearSCADA 2014 R1 (build 75.5210) and prior, 2014 R1.1 (build 75.5387) and prior, 2015 R1 (build 76.5648) and prior, and 2015 R2 (build 77.5882) and prior. An attacker with network access to the ClearSCADA server can send specially crafted sequences of commands and data packets.
CVE-2017-6021 has a severity rating of high with a score of 7.5.
Schneider Electric ClearSCADA versions 2014 R1, 2014 R1.1, 2015 R1, and 2015 R2 are affected.
An attacker with network access to the ClearSCADA server can exploit CVE-2017-6021 by sending specially crafted sequences of commands and data packets.
More information about CVE-2017-6021 can be found at the following references: [SecurityFocus](http://www.securityfocus.com/bid/96768) and [ICS-CERT](https://ics-cert.us-cert.gov/advisories/ICSA-17-068-01).