First published: Wed Feb 09 2022(Updated: )
A CWE-326: Inadequate Encryption Strength vulnerability exists that could cause non-encrypted communication with the server when outdated versions of the ViewX client are used. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Clearscada | ||
Schneider-electric Ecostruxure Geo Scada Expert 2019 | ||
Schneider-electric Ecostruxure Geo Scada Expert 2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24318 is high with a CVSS score of 7.5.
ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), and EcoStruxure Geo SCADA Expert 2020 are affected by CVE-2022-24318.
CVE-2022-24318 is a CWE-326 Inadequate Encryption Strength vulnerability that could cause non-encrypted communication with the server when outdated versions of the ViewX client are used.
To fix CVE-2022-24318, it is recommended to update to the latest version of the affected products provided by Schneider Electric.
More information about CVE-2022-24318 can be found at the following reference: [CVE-2022-24318](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05).