StruxureWare SCADA Expert ClearSCADA Remote Security Bypass

This script is Copyright (C) 2015-2017 Tenable Network Security, Inc.


Synopsis :

The remote web server is affected by an authentication bypass
vulnerability.

Description :

The remote web server is a version of StruxureWare SCADA Expert
ClearSCADA (formerly Schneider Electric ClearSCADA) prior to version
2010 R3.2 / 2014 R1.1, or a version of 2013 R1 to 2013 R2.1. It is,
therefore, affected by an authentication bypass vulnerability due to
the default guest account not being restricted.

See also :

http://www.nessus.org/u?4755812c
http://www.nessus.org/u?a8f8e976

Solution :

Change the default policy and remove guest account access to DBServer.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)

Family: SCADA

Nessus Plugin ID: 80359 ()

Bugtraq ID: 69840

CVE ID: CVE-2014-5412

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now