Check Point Advisories

Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing (CVE-2014-0779)

Check Point Reference: CPAI-2014-1485
Date Published: 27 Apr 2014
Severity: Medium
Last Updated: Tuesday 12 August, 2014
Source: Schneider Electric 2014-024-01
Industry Reference:CVE-2014-0779
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable? Schneider Electric ClearSCADA 2010 R2
Schneider Electric ClearSCADA 2010 R2.1
Schneider Electric ClearSCADA 2010 R3
Schneider Electric ClearSCADA 2010 R3.1
Schneider Electric SCADA Expert ClearSCADA 2013 R1
Schneider Electric SCADA Expert ClearSCADA 2013 R1.1
Schneider Electric SCADA Expert ClearSCADA 2013 R1.1a
Schneider Electric SCADA Expert ClearSCADA 2013 R1.2
Schneider Electric SCADA Expert ClearSCADA 2013 R2
Vulnerability Description A code execution vulnerability has been reported in Schneider Electric ClearSCADA. The vulnerability is due improper validation of a length parameter that is used to index an array in the OPF File parsing component. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious file.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability.

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  SCADA Protection Violation.
Attack Information:  Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK