Wonderware Clears Historian Client Hole

Tuesday, May 2, 2017 @ 02:05 PM gHale


Schneider Electric issued an update to mitigate an improper XML parser configuration in the Wonderware Historian Client, according to a report with ICS-CERT.

Wonderware Historian Client 2014 R2 SP1 and prior suffer from the issue, discovered by Andrey Zhukov from USSC, who reported the vulnerability and then tested the patch.

RELATED STORIES
Certec Updates Ativise Scada Holes
GE Clears Multilin SR Protective Relays Hole
Hyundai Updates Blue Link App
Sierra Wireless Mitigates Vulnerabilities

Successful exploitation of this vulnerability could allow a malicious entity to cause denial of service of trend display or to disclose arbitrary files from the local file system to a malicious web site.

The product sees action in the critical manufacturing, energy, healthcare and public health, and water and wastewater systems sectors. It also sees use on a global basis.

There are no known public exploits specifically targeting this vulnerability. However, it would take an attacker with low skill level to leverage the vulnerability.

An improperly restricted XML parser may allow an attacker to enter malicious input through the application which could cause a denial of service or disclose file contents from a server or connected network.

CVE-2017-7907 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 6.6.

Schneider Electric recommends that users of Wonderware Historian Client 2014 R2 SP1 apply update HC_SecurityHF_10.6.13100. Users of older versions of Wonderware Historian Client are also affected and should first upgrade to Wonderware Historian Client 2014 R2 SP1 and then apply HC_SecurityHF_10.6.13100.

Users of Wonderware Historian Client can login at this support web site to download the upgrade.

Schneider Electric issued Security Bulletin LFSEC00000120, which contains additional information.



Leave a Reply

You must be logged in to post a comment.