Ecostruxure Geo Scada Expert 2019 Schneider Electric Ecostruxure Geo Scada Expert 2019

Do you want an email whenever new security vulnerabilities are reported in Schneider Electric Ecostruxure Geo Scada Expert 2019?

By the Year

In 2024 there have been 0 vulnerabilities in Schneider Electric Ecostruxure Geo Scada Expert 2019 . Last year Ecostruxure Geo Scada Expert 2019 had 3 security vulnerabilities published. Right now, Ecostruxure Geo Scada Expert 2019 is on track to have less security vulnerabilities in 2024 than it did last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 3 6.77
2022 4 6.70
2021 1 6.70
2020 1 7.80
2019 0 0.00
2018 0 0.00

It may take a day or so for new Ecostruxure Geo Scada Expert 2019 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Schneider Electric Ecostruxure Geo Scada Expert 2019 Security Vulnerabilities

A CWE-117: Improper Output Neutralization for Logs vulnerability exists

CVE-2023-0595 5.3 - Medium - February 24, 2023

A CWE-117: Improper Output Neutralization for Logs vulnerability exists that could cause the misinterpretation of log files when malicious packets are sent to the Geo SCADA server's database web port (default 443). Affected products: EcoStruxure Geo SCADA Expert 2019, EcoStruxure Geo SCADA Expert 2020, EcoStruxure Geo SCADA Expert 2021(All Versions prior to October 2022), ClearSCADA (All Versions)

Improper Output Neutralization for Logs

A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists

CVE-2023-22611 7.5 - High - January 31, 2023

A CWE-200: Exposure of Sensitive Information to an Unauthorized Actor vulnerability exists that could cause information disclosure when specific messages are sent to the server over the database server TCP port. Affected Products: EcoStruxure Geo SCADA Expert 2019 - 2021 (formerly known as ClearSCADA) (Versions prior to October 2022)

A CWE-863: Incorrect Authorization vulnerability exists

CVE-2023-22610 7.5 - High - January 31, 2023

A CWE-863: Incorrect Authorization vulnerability exists that could cause Denial of Service against the Geo SCADA server when specific messages are sent to the server over the database server TCP port.

AuthZ

A CWE-295: Improper Certificate Validation vulnerability exists

CVE-2022-24319 5.9 - Medium - February 09, 2022

A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA web server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

Improper Certificate Validation

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists

CVE-2022-24321 7.5 - High - February 09, 2022

A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists that could cause Denial of Service against the Geo SCADA server when receiving a malformed HTTP request. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

Improper Check for Unusual or Exceptional Conditions

A CWE-295: Improper Certificate Validation vulnerability exists

CVE-2022-24320 5.9 - Medium - February 09, 2022

A CWE-295: Improper Certificate Validation vulnerability exists that could allow a Man-in-theMiddle attack when communications between the client and Geo SCADA database server are intercepted. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

Improper Certificate Validation

A CWE-326: Inadequate Encryption Strength vulnerability exists

CVE-2022-24318 7.5 - High - February 09, 2022

A CWE-326: Inadequate Encryption Strength vulnerability exists that could cause non-encrypted communication with the server when outdated versions of the ViewX client are used. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)

Inadequate Encryption Strength

Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior)

CVE-2021-22741 6.7 - Medium - May 26, 2021

Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that .sde configuration export files do not contain user account password hashes.

Use of Password Hash With Insufficient Computational Effort

A CWE-522: Insufficiently Protected Credentials vulnerability exists in EcoStruxure Geo SCADA Expert 2019 (Original release and Monthly Updates to September 2020, from 81.7268.1 to 81.7578.1) and EcoStruxure Geo SCADA Expert 2020 (Original release and Monthly Updates to September 2020, from 83.7551.1 to 83.7578.1)

CVE-2020-28219 7.8 - High - December 11, 2020

A CWE-522: Insufficiently Protected Credentials vulnerability exists in EcoStruxure Geo SCADA Expert 2019 (Original release and Monthly Updates to September 2020, from 81.7268.1 to 81.7578.1) and EcoStruxure Geo SCADA Expert 2020 (Original release and Monthly Updates to September 2020, from 83.7551.1 to 83.7578.1), that could cause exposure of credentials to server-side users when web users are logged in to Virtual ViewX.

Insufficiently Protected Credentials

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Schneider Electric Ecostruxure Geo Scada Expert 2020 or by Schneider Electric? Click the Watch button to subscribe.

subscribe