CVE-2020-12525

7.3 HIGH

📋 TL;DR

This vulnerability in M&M Software's fdtCONTAINER Component allows attackers to execute arbitrary code by deserializing untrusted data from project storage files. It affects industrial control systems using vulnerable versions of the software, potentially compromising operational technology environments.

💻 Affected Systems

Products:
  • M&M Software fdtCONTAINER Component
Versions: Below 3.5.20304.x and between 3.6 and 3.6.20304.x
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects industrial control systems using FDT/DTM technology for device integration

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or disruption of industrial processes

🟠

Likely Case

Local privilege escalation or arbitrary code execution when malicious project files are processed

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to supply malicious project file or access to project storage

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.5.20304.x or 3.6.20304.x and above

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2020-038

Restart Required: Yes

Instructions:

1. Download updated version from M&M Software 2. Backup existing configuration 3. Install update 4. Restart affected systems

🔧 Temporary Workarounds

Restrict project file access

all

Limit who can create/modify project files and implement file integrity monitoring

Network segmentation

all

Isolate fdtCONTAINER systems from untrusted networks and implement firewall rules

🧯 If You Can't Patch

  • Implement strict access controls on project storage directories
  • Use application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check fdtCONTAINER version in software about dialog or registry

Check Version:

Check HKEY_LOCAL_MACHINE\SOFTWARE\M&M Software\fdtCONTAINER\Version on Windows

Verify Fix Applied:

Verify version is 3.5.20304.x or 3.6.20304.x or higher

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from fdtCONTAINER
  • Failed deserialization attempts
  • Access to unusual project files

Network Indicators:

  • Unexpected outbound connections from fdtCONTAINER hosts

SIEM Query:

Process creation where parent_process contains 'fdtCONTAINER' and command_line contains suspicious patterns

🔗 References

📤 Share & Export