First published: Wed Feb 09 2022(Updated: )
A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA database server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Clearscada | ||
Schneider-electric Ecostruxure Geo Scada Expert 2019 | ||
Schneider-electric Ecostruxure Geo Scada Expert 2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2022-24320.
The CWE ID associated with this vulnerability is CWE-295.
CVE-2022-24320 has a severity rating of 5.9 (medium).
This vulnerability affects ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), and EcoStruxure Geo SCADA Expert 2020.
To prevent a Man-in-the-Middle attack in this case, it is recommended to ensure proper certificate validation is implemented for communications between the client and Geo SCADA database server.