First published: Wed Feb 09 2022(Updated: )
A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA web server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Clearscada | ||
Schneider-electric Ecostruxure Geo Scada Expert 2019 | ||
Schneider-electric Ecostruxure Geo Scada Expert 2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24319 is a vulnerability known as Improper Certificate Validation that allows for a Man-in-the-Middle attack on the client and Geo SCADA web server.
The affected products include ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), and EcoStruxure Geo SCADA Expert 2020.
The severity of CVE-2022-24319 is medium (5.9).
To prevent a Man-in-the-Middle attack in Geo SCADA, it is recommended to ensure proper certificate validation and encryption of communications.
More information about CVE-2022-24319 can be found at the following references: [Reference 1](https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05), [Reference 2](https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0018/MNDT-2022-0018.md).