First published: Mon Feb 12 2018(Updated: )
A cross-site request forgery vulnerability exists on the Secure Gateway component of Schneider Electric's PowerSCADA Anywhere v1.0 redistributed with PowerSCADA Expert v8.1 and PowerSCADA Expert v8.2 and Citect Anywhere version 1.0 for multiple state-changing requests. This type of attack requires some level of social engineering in order to get a legitimate user to click on or access a malicious link/site containing the CSRF attack.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Powerscada Anywhere | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9963 is classified as a medium severity vulnerability due to its potential for exploitation through cross-site request forgery.
To fix CVE-2017-9963, apply the latest patches from Schneider Electric for the affected PowerSCADA Anywhere version.
CVE-2017-9963 affects Schneider Electric's PowerSCADA Anywhere version 1.0, and the corresponding versions of PowerSCADA Expert and Citect Anywhere.
CVE-2017-9963 is related to cross-site request forgery attacks that can exploit state-changing requests.
Currently, the best workaround for CVE-2017-9963 is to limit access to the affected components until a patch can be applied.