Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2014-5301 | Schneider Electric StruxureWare SCADA Expert ClearSCADA 2010 R3 through 2014 R1 uses the MD5 algorithm for an X.509 certificate, which makes it easier for remote attackers to spoof servers via a cryptographic attack against this algorithm. |
Solution
Asset owners should always obtain a signed web certificate from a certified authority before deploying ClearSCADA Web Server in a production environment. To assist asset owners who are currently using self-signed certificates, a standalone utility will be made available that can be used to generate and deploy a new self-signed certificate (signed using an SHA signing algorithm). This utility is recommended for existing ClearSCADA systems subject to this vulnerability, removing the need to upgrade the ClearSCADA software and perform a manual generation of a new certificate. This utility will be made available within the Software Downloads section of the following ClearSCADA Resource Center page: http://resourcecenter.controlmicrosystems.com/display/CS/SCADA+Expert+ClearSCADA+Support
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Schneider Electric SCADA Expert ClearSCADA Cryptographic Issues | |
| References |
| |
| Metrics |
cvssV2_0
|
cvssV2_0
|
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-04T22:59:00.297Z
Reserved: 2014-08-22T00:00:00
Link: CVE-2014-5413
No data.
Status : Deferred
Published: 2014-09-18T10:55:11.733
Modified: 2025-11-04T23:15:33.543
Link: CVE-2014-5413
No data.
OpenCVE Enrichment
No data.
EUVD