Schneider Electric is aware of multiple vulnerabilities affecting TCP/ITreck Inc.’s embedded TCP/IP stack, collectively known as Ripple20, which Treck disclosed publicly on June 16.

The vulnerabilities range in severity and therefore have varying levels of risk. Schneider Electric continues to assess how the newly disclosed vulnerabilities affect its offers.

The company will continue to update this notification as additional offer-specific information becomes available.

Customers should immediately ensure they have implemented cybersecurity best practices across their operations to protect themselves from possible exploitation of these vulnerabilities.

Where appropriate, this includes locating their industrial systems and remotely accessible devices behind firewalls; installing physical controls to prevent unauthorized access; preventing mission-critical systems and devices from being accessed from outside networks; and following the remediation and general security recommendations below.

Schneider Electric has determined that the following offers are impacted. The companywill update this table as it continues to assess the impact these vulnerabilities have on its offers. Please subscribe to the Schneider Electric security notification service to be informed of critical updates to this notification, including information on affected products and remediation plans:
https://www.se.com/ww/en/work/support/cybersecurity/security-notifications.jsp

One thought on “Schneider Electric Treck Embedded Systems TCP/IP Vulnerabilities”
  1. Excellent post. Keep posting such kind of information on your page.
    Im really impressed by it.
    Hi there, You’ve done a fantastic job. I will
    definitely digg it and in my view recommend to my friends. I am sure they will
    be benefited from this website.

Comments are closed.

error: Content is protected !!