Vulnerability Description
A CWE-326: Inadequate Encryption Strength vulnerability exists that could cause non-encrypted communication with the server when outdated versions of the ViewX client are used. Affected Product: ClearSCADA (All Versions), EcoStruxure Geo SCADA Expert 2019 (All Versions), EcoStruxure Geo SCADA Expert 2020 (All Versions)
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Clearscada | All versions |
| Schneider-Electric | Ecostruxure Geo Scada Expert 2019 | All versions |
| Schneider-Electric | Ecostruxure Geo Scada Expert 2020 | All versions |
Related Weaknesses (CWE)
References
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05PatchVendor Advisory
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05PatchVendor Advisory
FAQ
What is CVE-2022-24318?
CVE-2022-24318 is a vulnerability with a CVSS score of 7.5 (HIGH). A CWE-326: Inadequate Encryption Strength vulnerability exists that could cause non-encrypted communication with the server when outdated versions of the ViewX client are used. Affected Product: Clear...
How severe is CVE-2022-24318?
CVE-2022-24318 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-24318?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Clearscada, Schneider-Electric Ecostruxure Geo Scada Expert 2019, Schneider-Electric Ecostruxure Geo Scada Expert 2020.