CVE-2022-24321

7.5 HIGH

📋 TL;DR

A vulnerability in Geo SCADA servers allows denial of service attacks when processing malformed HTTP requests. This affects ClearSCADA and EcoStruxure Geo SCADA Expert 2019/2020 systems. Attackers can crash the server by sending specially crafted HTTP packets.

💻 Affected Systems

Products:
  • ClearSCADA
  • EcoStruxure Geo SCADA Expert 2019
  • EcoStruxure Geo SCADA Expert 2020
Versions: All Versions
Operating Systems: Windows Server (typical SCADA deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all versions of listed products regardless of configuration when HTTP service is enabled.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of SCADA operations, potentially affecting critical infrastructure monitoring and control capabilities.

🟠

Likely Case

Temporary service outage requiring server restart, disrupting SCADA monitoring until service is restored.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring detecting anomalous HTTP traffic.

🌐 Internet-Facing: HIGH - Internet-exposed servers are directly vulnerable to DoS attacks from any source.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could still cause service disruption.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed HTTP requests but no authentication is needed. The vulnerability is in HTTP request processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric security updates SEVD-2022-039-05

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-05

Restart Required: Yes

Instructions:

1. Download security update from Schneider Electric portal. 2. Apply patch following vendor instructions. 3. Restart Geo SCADA services. 4. Verify service functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict HTTP access to Geo SCADA servers to trusted networks only

Web Application Firewall

all

Deploy WAF to filter malformed HTTP requests before they reach SCADA server

🧯 If You Can't Patch

  • Implement strict network access controls to limit HTTP traffic to SCADA servers
  • Deploy intrusion detection systems to monitor for malformed HTTP requests and alert on potential attacks

🔍 How to Verify

Check if Vulnerable:

Check if running affected product versions. Review Schneider Electric security bulletin for specific version details.

Check Version:

Check ClearSCADA/Geo SCADA Expert version through product administration interface or vendor documentation.

Verify Fix Applied:

Verify patch installation through vendor update verification tools and confirm HTTP service remains stable under normal traffic.

📡 Detection & Monitoring

Log Indicators:

  • HTTP service crashes
  • Unusual HTTP request patterns
  • Service restart events

Network Indicators:

  • Malformed HTTP packets to SCADA server ports
  • Unusual HTTP traffic spikes

SIEM Query:

source="scada_server" AND (event="service_crash" OR http_request_size>threshold)

🔗 References

📤 Share & Export