Schneider Electric ConneXium Buffer Overflow Vulnerability
Date: 2 November 2016
The purpose of this advisory is to bring attention to a recently disclosed vulnerability in Schneider Electric ConneXium.
A buffer overflow vulnerability was identified in Schneider Electric’s ConneXium firewall product. Exploitation of this vulnerability could allow an attacker to execute code during the login authentication process with SNMP. Schneider Electric is currently developing a firmware update to mitigate this vulnerability.
- TCSEFEC23F3F20 all versions
- TCSEFEC23F3F21 all versions
- TCSEFEC23FCF20 all versions
- TCSEFEC23FCF21 all versions
- TCSEFEC2CF3F20 all versions.
CVE Reference: CVE-2016-8352
CCIRC recommends that owner/operators test and deploy the vendor released updates or workarounds to affected platforms accordingly.
- https://www.publicsafety.gc.ca/cnt/rsrcs/cybr-ctr/2012/tr12-002-en.aspx (ISC Best Practices)
Note to Readers
In support of Public Safety's mission to build a safe and resilient Canada, CCIRC's mandate is to help ensure the security and resilience of the vital non-federal government cyber systems that underpin Canada's national security, public safety and economic prosperity. As Canada's computer security incident response team, CCIRC is Canada's national coordination centre for the prevention and mitigation of, preparedness for, response to, and recovery from cyber incidents on non-federal government systems. It does this by providing authoritative advice and support, and coordinating information sharing and incident response.
Please note, CCIRC PGP key has recently been updated.
For general information, please contact Public Safety Canada's Public Affairs division at:
Telephone: 613-944-4875 or 1-800-830-3118
- Date modified: