Check Point Reference: | CPAI-2014-1485 |
Date Published: | 27 Apr 2014 |
Severity: | Medium |
Last Updated: | Tuesday 12 August, 2014 |
Source: | Schneider Electric 2014-024-01 |
Industry Reference: | CVE-2014-0779 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Schneider Electric ClearSCADA 2010 R2 Schneider Electric ClearSCADA 2010 R2.1 Schneider Electric ClearSCADA 2010 R3 Schneider Electric ClearSCADA 2010 R3.1 Schneider Electric SCADA Expert ClearSCADA 2013 R1 Schneider Electric SCADA Expert ClearSCADA 2013 R1.1 Schneider Electric SCADA Expert ClearSCADA 2013 R1.1a Schneider Electric SCADA Expert ClearSCADA 2013 R1.2 Schneider Electric SCADA Expert ClearSCADA 2013 R2 |
Vulnerability Description | A code execution vulnerability has been reported in Schneider Electric ClearSCADA. The vulnerability is due improper validation of a length parameter that is used to index an array in the OPF File parsing component. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious file. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SCADA Protection Violation.
Attack Information: Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing