Update: The SAGE Team is proud to announce the release of our latest firmware release for the SAGE RTU product family. There are many important security enhancements, including this VxWorks Urgent/11 fix, and exciting features included in this release. For more details about the release, see our post here.
Schneider Electric is aware of recently disclosed vulnerabilities in Wind River’s VxWorks TCP/IP Stack. These vulnerabilities have wide-ranging impact across multiple IT and industrial applications. We are working closely with Wind River to understand and assess how these vulnerabilities impact Schneider Electric offers and our customers’ operations.
We downloaded Wind River’s patches as soon as they were made available to us, and we have quickly instituted a remediation plan to evolve all current and future products that rely on the Wind River platform to embed these fixes. We will continue to monitor and will respond further if new information becomes available.
In the meantime, customers should immediately make sure they have implemented cybersecurity best practices across their operations to protect themselves from these vulnerabilities. Where appropriate this includes locating your industrial systems and remotely accessible devices behind firewalls; installing physical controls to prevent unauthorized access; and preventing mission-critical systems and devices from being accessed from outside networks.
Please subscribe to the Schneider Electric security notification service to be informed of updates to this disclosure, including details on affected products and remediation plans, as well as other important security notifications:
For additional information and support, please contact your Schneider Electric sales or service representative or Schneider Electric’s Customer Care Center.
An update for our customers regarding the recently announced Urgent/11 VxWorks vulnerabilities.
We are aware of the vulnerabilities and working to include the patches for these vulnerabilities in our SAGE RTU operating system. We are committed to the security of your equipment and will release a patch as soon as possible.
These vulnerabilities are all related to the TCP/IP network stack. If your RTU is not connected to one of the ethernet ports, which could possibly be accessed from a network, there is no additional risk associated to these devices. Only network connected devices are affected by these vulnerabilities. Serial connections are not affected.
These patches will be included in our next firmware release, C3414-500-S02K4, which will include this and other exciting features like RADIUS authentication, and some excellent improvements to our SEL Relay interoperability. Keep an eye out for the firmware release here.
If you have any questions, feel free to contact me.
See the official announcement for all Schneider Electric products here.