Important security notification – Schneider-Electric Software Update « SESU »

2022-02-22
■The vulnerability identified:
●The Schneider Electric software suite has a centralized update mechanism for updating Schneider software on a Windows PC. The software on the customer PC uses the update service as the mechanism of communication with the update server in order to receive periodic software updates. This Vulnerability has a non signed communication between the SESU client on the customer PC and the Software Update server. Under certain circumstances and conditions this communication has the potential to execute arbitrary code on a vulnerable system which could result in unexpected consequences. This vulnerability was discovered during cyber security research both by an external researcher and by Schneider Electric internal investigations. There is no evidence that this vulnerability has been exploited. This vulnerability would require network access to the target device.
●Schneider Electric takes these vulnerabilities very seriously and we have devoted resources to immediately investigate and address these issues. We believe it is critical to consider the whole picture, including safety, security and reliability. Any patches/solutions/mitigations we release will be carefully tested to ensure that they can be deployed in a manner that is both safe and secure.

SCHNEIDER

More

More

Technical Documentation

More

More

Please see the document for details

More

More

English Chinese Chinese and English Japanese

2013/1/30

22 KB

- The full preview is over,the data is 2 pages -
  • +1 Like
  • Add to Favorites

Recommend

All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.

Contact Us

Email: