We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on
Cloud Connected vs On-Premise Services. Your feedback can
help us shape the future of services. Learn more about the survey
or
Click here to Launch the survey Schneider Electric Services Innovation Team!
[Imported] Spectre Vulnerability and Scadapack Chipsets?
Remote Operations Forum
Support forum for Schneider Electric SCADA systems, radios and RTUs. From commissioning integration devices and software, to enhancing existing installations or troubleshooting.
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-10-2503:41 PM
[Imported] Spectre Vulnerability and Scadapack Chipsets?
>>Message imported from previous forum - Category:SCADAPack RTU<< User: mchartrand, originally posted: 2018-10-18 19:27:39 Id:130 This is a re-posting from the obsoleted (October 2018) "Schneider Electric Telemetry & SCADA" forum.
-------------------------------
**_Robzilla56: The world is freaking out about this right now. Are the chipsets used in scadapacks a potential point of vulnerability? From what I can tell almost all microprocessors have an issue on a hardware level that will require patches. I have equipment on military bases and they all want to know. Any thoughts?_**
____________________________________
bevanweiss: Spectre allows for nefarious code running against a vulnerable microprocessor to determine the randomisation applied to 'mask' Kernel memory addresses.
Meltdown allows for nefarious code running against a vulnerable microprocessor to determine the value stored at what should be otherwise privileged memory addresses (which is where Spectre helps... since the memory will be randomised which Spectre will let you derandomise). i.e. allows for unprivileged code (like a piece of Javascript) to read privileged data values (like the nuclear launch codes you have in a text file on your Windows desktop).
Only devices that access insecure executable code (like MS Office documents with macros, or Web Browsers etc) are really included in the attack surface area for such an exploit. It's also only Intel x86-64, and ARM A75 processors that are vulnerable to the Meltdown, patches are in the works for major OSes. SCADAPack RTUs use either x86 (not 64) or lower end ARM processors, so aren't impacted by Meltdown.
This doesn't mean that it can't *affect* RTUs and Radios... after all, they will be secured from 'tampering' by passwords etc, which are likely stored on a PC / Server which *can* run arbitrary code.
Spectre/Meltdown don't deserve much different treatment than all other cyber security vulnerabilities. You should be using application whitelists, you should be performing OS and application patching regularly, you should be separating your various levels of 'secure information' as far apart physically as possible (certainly not running them on the same piece of hardware it seems)...
_____________________
**_Robzilla56: Forgive me for my ignorance on the subject. Really I just didn't know what chipsets the scadapacks used but it is good to know that they are not affected. Here is a link to the affected chipsets if anyone reads this thread and needs to know: https://developer.arm.com/support/security-update I was also comforted by the Security notification sent out by Schneider ClearSCADA product team._**