{"support":{"yesButton":"yes","noButton":"no","feedback":{"title":"What can we do to improve?"},"submitButton":"Submit","successMessage":"Thank you for your feedback","title":"Was this helpful?","feedbackPercentLabel":"of people found this helpful","captcha":{"error":"Please tick the box"}}}
Search FAQs
{"searchBar":{"inputPlaceholder":"Search by keyword or ask a question","searchBtn":"Search","error":"Please enter a keyword to search"}}
How to find information on malware targeting products and systems
Issue:
Industrial Control Systems (ICS's) in asset owner environment may get compromised by malware and their variants
Product Line:
Internet-connected, Windows-based Human Machine Interfaces (HMI's)
Environment:
Industrial Control System Security Vulnerabilities
Cause:
Potential vulnerabilities or cyber incidents that may compromise the security of Industrial Control Systems.
Resolution:
Schneider Electric’s vulnerability management policy is to address cybersecurity vulnerabilities affecting Schneider Electric products and systems in order to support the security and safety of our installed solutions, protecting our customers and the environment. This policy is located at the following URL:
https://www.schneider-electric.com/en/download/document/Vuln_Mgmt_Policy/
All public notifications and postings relating to vulnerability management released by Schneider Electric are located here:
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
You may see these notifications for information regarding the security vulnerabilities, affected products, and steps to assess the current state of your system following such incidents.
Industrial Control Systems (ICS's) in asset owner environment may get compromised by malware and their variants
Product Line:
Internet-connected, Windows-based Human Machine Interfaces (HMI's)
Environment:
Industrial Control System Security Vulnerabilities
Cause:
Potential vulnerabilities or cyber incidents that may compromise the security of Industrial Control Systems.
Resolution:
Schneider Electric’s vulnerability management policy is to address cybersecurity vulnerabilities affecting Schneider Electric products and systems in order to support the security and safety of our installed solutions, protecting our customers and the environment. This policy is located at the following URL:
https://www.schneider-electric.com/en/download/document/Vuln_Mgmt_Policy/
All public notifications and postings relating to vulnerability management released by Schneider Electric are located here:
http://www2.schneider-electric.com/sites/corporate/en/support/cybersecurity/cybersecurity.page
You may see these notifications for information regarding the security vulnerabilities, affected products, and steps to assess the current state of your system following such incidents.
Explore more
Product:
Explore more
Product:
Can't find what you are looking for?
Reach out to our Customer Care team to receive information on technical support, assistance for complaints and more.