Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allows remote attackers to read database records by leveraging access to the guest account.
Advisories
Source ID Title
EUVD EUVD EUVD-2014-5300 Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 allows remote attackers to read database records by leveraging access to the guest account.
Fixes

Solution

Schneider Electric advises all ClearSCADA users to take steps to secure the interfaces to the ClearSCADA system. The ClearSCADA database security configuration should be reviewed and updated to limit all system access to authorized users only. The access permissions of existing users should be reduced to only those required by their role (e.g., removing any higher level System Administration privileges from Operations or Engineering users), and specific accounts should be created with appropriate permissions for performing System Administration tasks. Existing ClearSCADA customers using WebX can protect their system from cross-site scripting attacks by disabling the “Allow database shutdown via WebX” option within the ClearSCADA Server Configuration utility. Existing ClearSCADA customers should take measures to ensure their system does not grant any system access until users have supplied a valid username and password. Schneider Electric has corrected the default user security permissions; however, upgrading an existing vulnerable installation to a new version will not affect existing configured database security permissions. Therefore, the measures suggested here are strongly recommended for all users. Schneider Electric has corrected these vulnerabilities in the following service packs: * ClearSCADA 2010 R3.2, Released October 2014, and * SCADA Expert ClearSCADA 2014 R1.1, Released October 2014. If asset owners wish to upgrade to a new ClearSCADA Service Pack, please contact the local Schneider Electric office for the latest software version for ClearSCADA; alternatively, these new versions are available for direct download from the Schneider Electric web site. To update their license (not required when upgrading to a service pack of the same version), asset owners are required to complete and submit an online form, which is available here: http://resourcecenter.controlmicrosystems.com/display/CS/StruxureWare+SCADA+Expert+ClearSCADA+Update... http://resourcecenter.controlmicrosystems.com/display/CS/StruxureWare+SCADA+Expert+ClearSCADA+Update+Request+Form New Service packs for ClearSCADA are available for download here: http://resourcecenter.controlmicrosystems.com/display/CS/SCADA+Expert+ClearSCADA+Support General instructions on how to upgrade the ClearSCADA license (if required) are available here: http://resourcecenter.controlmicrosystems.com/display/CS/Updating+Your+ClearSCADA+License


Workaround

No workaround given by the vendor.

History

Tue, 04 Nov 2025 23:00:00 +0000

Type Values Removed Values Added
Title Schneider Electric SCADA Expert ClearSCADA Improper Authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 5.0, 'vector': 'AV:N/AC:L/Au:N/C:P/I:N/A:N'}

cvssV2_0

{'score': 6.4, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-11-04T22:56:12.970Z

Reserved: 2014-08-22T00:00:00

Link: CVE-2014-5412

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-09-18T10:55:11.687

Modified: 2025-11-04T23:15:33.393

Link: CVE-2014-5412

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.