12 September 2018
Schneider Electric products shipped with infected USB media
Schneider Electric has notified users that some of the USB media shipped with Conext ComBox and Conext Battery Monitor products may have been infected with malware during manufacturing at a third-party supplier’s facility.
The media contain user documentation and non-essential software utilities. They do not contain any operational software and are not required for the installation or operation of Conext ComBox or Conext Battery Monitor. This means that the issue does not affect the operation or security of these products.
According to a statement released by Schneider Electric, the malware on the infected USB media should be detected and blocked by all major anti-malware programs. However, out of caution, the company recommends not using the USB removable media shipped with these products and performing a full scan of the relevant systems for malware.
Source: Schneider Electric
Cryptographic deadly sins and the security of Modicon M100/M200/M221
28 January 2021
From buffer overflow to switchboard setup errors: vulnerabilities in building operation software by Schneider Electric
27 January 2021
Twentieth for Ripple20: Vulnerability in embedded web server of I/O expansion modules for IoT
26 January 2021