Cryptographic Vulnerability in Schneider Electric SCADA System
CVE-2014-5413
Currently unrated
Summary
Schneider Electric StruxureWare SCADA Expert ClearSCADA from versions 2010 R3 through 2014 R1 employs the MD5 hashing algorithm for X.509 certificates. This reliance on the MD5 algorithm introduces significant security risks, enabling remote attackers to exploit vulnerabilities in the cryptographic implementation and potentially spoof server identities. Such spoofing can lead to unauthorized access and manipulation of critical SCADA system functions.
References
Timeline
Vulnerability published
Vulnerability Reserved