Two newly discovered vulnerabilities have been classified with a maximum CVSS Score of 10 and users of Schneider Electric ETG3000 FactoryCast HMI Gateway should take immediate action to protect SCADA systems from attack.

The vulnerabilities concern hard-coded FTP credentials, assigned CVE-2014-9198, which effectively bypasses any authentication requirement for access. At the same time, a critical Java configuration file - rde.jar - has been found to be accessible without authentication, potentially allowing the gateway configuration to be overridden. This latter vulnerability has been assigned CVE-2014-9197.

Remediation and mitigation advice has already been provided, requiring a firmware upgrade for the gateway.

For NERC CIP Version 5 compliance maintaining cyber security is of paramount importance and the protection of SCADA and other BES systems is essential. As more emphasis is placed on critical infrastructure protection it is inevitable that more vulnerabilities will be discovered, and in turn, sharpening the classic 'double-edged sword' of vulnerability management: as soon as a vulnerability is discovered and understood, remediation or mitigation steps can be provided, however, the disclosure process also makes the vulnerability widely known to would-be attackers too, compounding and increasing the threat.

Correct operation of NERC CIP-007-3 compliance would have identified the use of FTP for the gateway. The CIP-007 requirement questions the necessity of any open ports such as this and where the service or port is deemed essential, compensating security controls should be implemented. So in this example, internal firewalling in line with CIP-005-5 compliance should have been operated to ensure that only controlled, limited access to the FTP service was allowed - often the use of a 'jump server' is a good idea to limit access to only specified devices and IP addresses, providing extra layers of access control.

For more background to the vulnerabilities CVE-2014-9197 and CVE-2014-9198, and the remediation advice see the ICS-CERTAdvisory (ICSA-15-020-02) 


NNT Suite of Products

change tracker gen7r2 logo

Combine industry leading Device Hardening, File Integrity Monitoring, Change Control, Configuration Management & Compliance Management into one easy to use solution that can scale to the most demanding environments!

fastcloud logo

Automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology) Integrity Assurance.

log tracker logo logo

Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds.

vulnerability tracker logo

Continuously scan and identify vulnerabilities with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

USA Offices
New Net Technologies LLC
Suite #10115, 9128 Strada Place
Naples, Florida, 34108
1175 Peachtree St NE
Atlanta, Georgia, 30361.
4145 SW Watson, Suite 350
Beaverton, Oregon, 97005.

Tel: (844) 898-8358
email [email protected]
UK Office
New Net Technologies Ltd
Rivers Lodge, West Common
Harpenden, Hertfordshire

Tel: 01582 287310
email [email protected]
CIS benchmarking SEWP Cybersecurity 500Sans Institute Now Certified IBM Security
Copyright 2019, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.