CVE-2014-5413 is a vulnerability in Schneider Electric Clearscada
Published on September 18, 2014
Schneider Electric SCADA Expert ClearSCADA Cryptographic Issues
Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorithm for an X.509 certificate, which makes it easier for remote attackers to spoof servers via a cryptographic attack against this algorithm.
Weakness Type
Cryptographic Issues
Weaknesses in this category are related to the design and implementation of data confidentiality and integrity. Frequently these deal with the use of encoding techniques, encryption libraries, and hashing algorithms. The weaknesses in this category could lead to a degradation of the quality data if they are not addressed.
Products Associated with CVE-2014-5413
Want to know whenever a new CVE is published for Schneider Electric Clearscada? stack.watch will email you.
Affected Versions
Schneider Electric ClearSCADA:- Version 2010 R3 (build 72.4560) is affected.
- Version 2010 R3.1 (build 72.4644) is affected.
- Version 2010 R3.2 is unaffected.
- Version 2013 R1 (build 73.4729) is affected.
- Version 2013 R1.1 (build 73.4832) is affected.
- Version 2013 R1.1a (build 73.4903) is affected.
- Version 2013 R1.2 (build 73.4955) is affected.
- Version 2013 R2 (build 74.5094) is affected.
- Version 2013 R2.1 (build 74.5192) is affected.
- Version 2014 R1 (build 75.5210) is affected.
- Version 2014 R1.1 is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.