ADVERTISEMENT
Thursday, May 21, 2026
Tech | Business | Economy
No Result
View All Result
  • Technology
    • Trends
    • Telecoms
      • Broadband
    • ConsumerTech
      • Gadgets and Appliances
      • Apps
      • Accessories
      • Reviews
      • Unboxing
    • EnterpriseTECH
    • Security & Data Protection
    • How To
  • Business
    • Company News
    • StartUPs
      • Founder’s Story
      • Funding
    • Deals
    • People & Moves
    • SME & Entrepreneur Focus
    • BUSINESS SENSE FOR SMEs
    • Competition & Market Positioning
    • Commerce & Mobility
    • Travel
    • WomenPreneurs
  • Economy
    • Macroeconomic Trends
      • Macro Monday
      • TE Insights
    • Finance
      • Banks
      • Fintech
      • Insurance
      • Digital Assets
      • Personal Finance
    • Policies
      • Tech & Society
    • Market Analysis
    • Jobs & Workforce Economy
  • Features
    • Guest Writer
      • Chidiverse
      • Digital Assets
      • GameTech
    • EventDIARY
    • IndustryINFLUENCERS
    • MarkTECH
    • TBS
    • NewsEXTRA
  • Editorial
  • Brand Content
  • TECHECONOMY TV
Thursday, May 21, 2026
Tech | Business | Economy
No Result
View All Result
Tech | Business | Economy
No Result
View All Result

Home » Vulnerabilities in Schneider UMAS Protocol Revealed

Vulnerabilities in Schneider UMAS Protocol Revealed

Techeconomy by Techeconomy
October 18, 2022
in Security & Data Protection
Reading Time: 3 mins read
0

Kaspersky ICS CERT investigated on Unified Messaging Application Services (UMAS) by Schneider Electric and the vulnerabilities of this highly popular protocol, which is used in multiple industries – from manufacturing to elevator control systems.

By exploiting described vulnerabilities, attackers could gain access to the whole automation system of an entity.

UMAS (Unified Messaging Application Services) is Schneider Electric’s proprietary protocol used to configure, monitor, collect data and control Schneider Electric industrial controllers. The use of protocol is very widespread among different industries.

The issues described by Kaspersky ICS CERT experts refer to unauthorised access to the programmable logic controller (PLC) and ways cybercriminals take to bypass authentication.

https://techeconomy.ng/2022/08/kaspersky-collaborates-ncc-csirts-advisory-on-yanluowang-ransomware-group/

In 2020, the vulnerability, CVE-2020-28212, was reported, which could be exploited by a remote unauthorised attacker to gain control of a programmable logic controller (PLC) with the privileges of an operator already authenticated on the controller.

Subscribe to our Telegram channel for the latest updates.

Follow the latest developments with instant alerts on breaking news, top stories, and trending headlines.

Join Channel

To address the vulnerability, Schneider Electric developed a new mechanism, Application Password, which should provide protection against unauthorised access to PLCs and unwanted modifications.

An analysis conducted by Kaspersky ICS CERT experts has shown that the implementation of the new security mechanism also has flaws.

The CVE-2021-22779 vulnerability, which was identified in the course of the research, could allow a remote attacker to make changes to the PLC, bypassing authentication.

As the researchers investigated, the main problem was that the authentication data used to “reserve” the device for modification was computed entirely on the client side, and the “secret” used could be obtained from PLC without authentication.

Schneider Electric published an advisory with a remediation addressing the vulnerabilities. Kaspersky ICS CERT in turn recommends to additionally use network monitoring and deep industrial protocol analysis solutions such as Kaspersky Industrial CyberSecurity for Networks, to monitor and control remote access attempts to PLC devices.

“The threat landscape is constantly evolving, and an organisation’s security strategy must constantly evolve as well to meet new challenges. Today, building cyber security system is not an end-state, but a continuous proactive process – that is proved by the example of the UMAS protocol. We’re grateful that Schneider Electric managed to respond that rapidly to the discovered vulnerabilities and provide its clients with appropriate solution and recommendations. However, our advice to all responsible for security within an enterprise is to implement special solutions,” comments Pavel Nesterov, a security expert at ICS CERT Kaspersky.

0Shares
Previous Post

Songhai Labs Joins Edo Innovates Tech conference

Next Post

DBI, ICDL to Partner on Digital Skills Certification Programmes

Techeconomy

Techeconomy

Related Posts

Agentic AI Security Market

Report: Agentic AI Security Market worth $13.52 billion by 2032

May 19, 2026
Nigerian jailed for romance scam

Nigerian Sentenced to 115 months in Jail for $700,000 Romance Scam

May 15, 2026

REPORT: NETSCOUT Hints on Shifting DDoS Attack Patterns in West Africa

May 13, 2026
Load More
Next Post

DBI, ICDL to Partner on Digital Skills Certification Programmes

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Techeconomy Podcast
Techeconomy Podcast

The Techeconomy Podcast is a thought-leadership show exploring the powerful intersection of technology, business, and the economy, with a strong focus on Africa’s fast-evolving digital landscape.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
byTecheconomy

Protecting Innovation in Africa’s Startup Ecosystem . A timely conversation for the future of African entrepreneurship.

PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
PROTECTING INNOVATION IN AFRICA’S STARTUP ECOSYSTEM
April 29, 2026
Techeconomy
BUILDING TRUST IN AFRICA ECOSYSTEM
February 27, 2026
Techeconomy
Navigating a Career in Tech Sales
January 29, 2026
Techeconomy
How Technology is Transforming Education, Health, and Business
November 27, 2025
Techeconomy
INNOVATION IN MOBILE BANKING
October 30, 2025
Techeconomy
Search Results placeholder
ADVERTISEMENT
  • About Us
  • Careers
  • Contact Us
  • Privacy Policy

© 2026 TECHECONOMY.

No Result
View All Result
  • Technology
  • Business
  • Economy
  • Features
  • Editorial
  • Brand Content
  • TECHECONOMY TV

© 2026 TECHECONOMY.

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.