CVE-2022-24318

7.5 HIGH

📋 TL;DR

CVE-2022-24318 is an encryption weakness vulnerability in Schneider Electric's SCADA systems that allows non-encrypted communication between outdated ViewX clients and servers. This affects ClearSCADA and EcoStruxure Geo SCADA Expert installations, potentially exposing sensitive industrial control data.

💻 Affected Systems

Products:
  • ClearSCADA
  • EcoStruxure Geo SCADA Expert 2019
  • EcoStruxure Geo SCADA Expert 2020
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability specifically affects outdated ViewX clients connecting to affected SCADA servers.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept unencrypted SCADA communications, gaining access to industrial control systems, manipulating operations, or causing physical damage to critical infrastructure.

🟠

Likely Case

Eavesdropping on unencrypted traffic to steal credentials, configuration data, or operational information from SCADA systems.

🟢

If Mitigated

Limited impact with proper network segmentation, updated clients, and monitoring for unencrypted traffic.

🌐 Internet-Facing: HIGH - If SCADA systems are internet-accessible, attackers can exploit weak encryption to intercept sensitive industrial data.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still intercept unencrypted communications within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept communications between vulnerable clients and servers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest versions with proper encryption

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05

Restart Required: Yes

Instructions:

1. Update all ViewX clients to latest versions. 2. Update SCADA servers to latest versions. 3. Restart both clients and servers. 4. Verify encryption is properly configured.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate SCADA systems from untrusted networks and implement strict firewall rules.

Client Update Enforcement

all

Enforce policy requiring all ViewX clients to be updated before connecting to SCADA servers.

🧯 If You Can't Patch

  • Implement network monitoring to detect unencrypted SCADA traffic
  • Use VPN or encrypted tunnels for all SCADA communications

🔍 How to Verify

Check if Vulnerable:

Check ViewX client version and verify if communicating with affected SCADA servers without proper encryption.

Check Version:

Check ViewX client version in application or via vendor documentation.

Verify Fix Applied:

Verify all ViewX clients are updated and network traffic shows proper encryption (TLS/SSL).

📡 Detection & Monitoring

Log Indicators:

  • Unencrypted connection attempts
  • Outdated client version logs
  • Failed encryption handshakes

Network Indicators:

  • Unencrypted traffic on SCADA ports
  • Outdated protocol usage
  • Missing TLS/SSL encryption

SIEM Query:

Search for network traffic on SCADA ports without encryption protocols or with outdated client versions.

🔗 References

📤 Share & Export