schneider-electric clearscada CVE-2021-22741 vulnerability in Schneider Electric Products
Published on May 26, 2021

Use of Password Hash with Insufficient Computational Effort vulnerability exists in ClearSCADA (all versions), EcoStruxure Geo SCADA Expert 2019 (all versions), and EcoStruxure Geo SCADA Expert 2020 (V83.7742.1 and prior), which could cause the revealing of account credentials when server database files are available. Exposure of these files to an attacker can make the system vulnerable to password decryption attacks. Note that .sde configuration export files do not contain user account password hashes.

NVD

Weakness Type

Use of Password Hash With Insufficient Computational Effort

The software generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computational effort that would make password cracking attacks infeasible or expensive.


Products Associated with CVE-2021-22741

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2021-22741 are published in these products:

 
 
 

Exploit Probability

EPSS
0.03%
Percentile
7.09%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.