First published: Wed May 26 2021(Updated: )
Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that “.sde” configuration export files do not contain user account password hashes.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Clearscada | ||
Schneider-electric Ecostruxure Geo Scada Expert 2019 | ||
Schneider-electric Ecostruxure Geo Scada Expert 2020 | <=83.7742.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ClearSCADA vulnerability is CVE-2021-22741.
The severity of CVE-2021-22741 is medium with a CVSS score of 6.7.
ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior) are affected by CVE-2021-22741.
CVE-2021-22741 can be exploited to reveal account credentials from the server database.
The Common Weakness Enumeration (CWE) ID for CVE-2021-22741 is 916.