We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on
Cloud Connected vs On-Premise Services. Your feedback can
help us shape the future of services. Learn more about the survey
or
Click here to Launch the survey Schneider Electric Services Innovation Team!
[Imported] Spectre Vulnerability and Trio Chipsets ?
Remote Operations Forum
Support forum for Schneider Electric SCADA systems, radios and RTUs. From commissioning integration devices and software, to enhancing existing installations or troubleshooting.
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send InviteCancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2019-10-2503:34 PM
[Imported] Spectre Vulnerability and Trio Chipsets ?
>>Message imported from previous forum - Category:Trio Data Radios<< User: joelw, originally posted: 2018-10-17 23:15:46 Id:129 This is a re-posting from the obsoleted (October 2018) "Schneider Electric Telemetry & SCADA" forum.
------------
**_Robzilla56: I just asked the same question in the SCADAPack section, but I'm also curious about the Trio radios. Are the Chipsets a potential vulnerability? If so are security patches in the works? If not please explain._**
------------------------
bevanweiss: Ummm..... I'm not sure you really understand the Spectre vulnerability (or the Meltdown vulnerability which is more important as it provides the actual exploit pathway).
The SCADAPack should only ever be executing your own pre-approved code, so the possibility of code privilege escalation should not be a factor. If you have a SCADAPack that executes arbitrary code via Javascript or something, please let me know.. it sounds cool.
The Trio radio should only ever be executing Schneider developed pre-approved code, so again the possibility of code privilege escalation should not be a factor. Again, if you know of a way to have a Trio radio execute arbitrary code let me know.
Perhaps you can detail what you think the Spectre vulnerability is about... And what the possible impact would be on your SCADAPack and Trio Radio?
Spectre / Meltdown is important in regards to the security of 'secrets' within the Telemetry space... but there are much more credible threats that should have actions applied against them before you start to worry about Spectre / Meltdown.
**_Robzilla56: Again forgive me for my ignorance on the subject. Really just didn't know what chipsets are in these products so I can tell customers "they are safe and not affected by this". I was not aware of the code privilege escalation and was simply interested in the affected chipsets. I have sent my customers the security notification that was sent by the Schneider Clearscada Product team. It was very clear and helpful. I do not have any javascript code...I will get right on that! Thanks for your time!_**
**"While the Trio J & Q CPUs are technically vulnerable, the exploit appears not to be possible, as we do not permit installation and execution of 3rd party (attacker) software." **