Building Operation App Hole Fixed

Wednesday, March 2, 2016 @ 02:03 PM gHale

Schneider Electric created a new version to mitigate a vulnerability in servers programmed with its StruxureWare Building Operation software, according to a report on ICS-CERT.

This vulnerability, discovered by independent researcher Karn Ganeshen, is remotely exploitable.

AMX Addressing Multiple Vulnerabilities
B+B SmartWorx Fixes Bypass Vulnerability
Siemens Fixes SIMATIC S7 Woes
Tollgrade Fixes SmartGrid System Holes

Application Server, V1.7 and prior suffer from the vulnerability.

A malicious authenticated user could exploit this vulnerability to circumvent access controls.

Paris, France-based Schneider Electric maintains offices in more than 100 countries.

The affected product, Application Server, is a building automation system for small and medium-sized buildings. Application Server sees action in the commercial facilities sector across the globe.

Some functions can allow administrative users to circumvent access controls.

CVE-2016-2278 is the case number assigned to this vulnerability, which has CVSS v3 base score of 7.2.

No known public exploits specifically target this vulnerability. An attacker with a low skill would be able to exploit this vulnerability.

Schneider Electric released a new version of Application Server firmware which remediates this vulnerability. The user is no longer allowed to operate the system with default credentials and the minimal “msh” shell can no longer end up circumvented. Users should contact their authorized Schneider Electric service channel to access the firmware update.

For more information, click on Schneider Electric’s Security Notification number SEVD-2016-025-01.

Leave a Reply

You must be logged in to post a comment.