Check Point Reference: | CPAI-2014-1485 |
Date Published: | 18 May 2014 |
Severity: | Medium |
Last Updated: | Thursday 08 May, 2014 |
Source: | CVE-2014-0779 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Schneider Electric ClearSCADA 2010 R2 Schneider Electric ClearSCADA 2010 R2.1 Schneider Electric ClearSCADA 2010 R3 Schneider Electric ClearSCADA 2010 R3.1 Schneider Electric SCADA Expert ClearSCADA 2013 R1 Schneider Electric SCADA Expert ClearSCADA 2013 R1.1 Schneider Electric SCADA Expert ClearSCADA 2013 R1.1a Schneider Electric SCADA Expert ClearSCADA 2013 R1.2 Schneider Electric SCADA Expert ClearSCADA 2013 R2 |
Vulnerability Description | A code execution vulnerability has been reported in Schneider Electric ClearSCADA. The vulnerability is due improper validation of a length parameter that is used to index an array in the OPF File parsing component. A remote attacker could exploit this vulnerability by enticing the target user to open a malicious file. |
This protection will detect and block attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, Protection tab and select the version of your choice.
SmartView Tracker will log the following entries:
Attack Name: SCADA Protection Violation.
Attack Information: Schneider Electric ClearSCADA OPF File Parsing Out of Bounds Array Indexing