Fortinet Discovers Authentication Bypass By Spoofing Vulnerability In Multiple Schneider Electric Products
Fortinet's FortiGuard Labs has discovered an authentication bypass vulnerability in Schneider Electric EcoStruxure Process Expert, EcoStruxure Control Expert, SCADAPack RemoteConnect for x70, SCADAPack x70 RTUs and Modicon Controllers M580 and M340.
EcoStruxure Process Expert is the next-generation process automation system to engineer, operate and maintain the entire plant.
EcoStruxure Control Expert is the common programming, debugging and operating software for Modicon M340, M580, M580S, Premium, Momentum and Quantum ranges.
SCADAPack RemoteConnect x70 is a Windows-based application providing a flexible, easy-to-use programming and configuration environment for the SCADAPack x70 RTU series.
SCADAPack x70 RTUs are smart RTUs which combine the monitoring and communication capabilities of a remote terminal unit (RTU) with the processing and data-logging power of a programmable logic controller (PLC).
Modicon Controllers M580 and M340 are the innovative Ethernet Programmable Automation Controller.
An authentication bypass by spoofing vulnerability was discovered in these products by FortiGuard Labs. The vulnerability exists due to weak authentication mechanism that could cause unauthorized access in read and write mode to the controller by spoofing the Modbus communication between the engineering software and the controller.
SolutionsFortiGuard Labs released the following FortiGate IPS signature which covers this specific vulnerability:
Released Jul 15, 2021
Users should apply the solution provided by Schneider Electric.
Fortinet reported the vulnerability to Schneider Electric on September 11, 2020.
Schneider Electric confirmed the vulnerability on October 14, 2020.
Schneider Electric provided mitigations on July 13, 2021.