CVE-2020-25184
📋 TL;DR
Rockwell Automation ISaGRAF Runtime versions 4.x and 5.x store passwords in plaintext files in the same directory as the executable. This allows local unauthenticated attackers to read sensitive credentials, leading to information disclosure. Industrial control systems using these versions are affected.
💻 Affected Systems
- Rockwell Automation ISaGRAF Runtime
📦 What is this software?
Aadvance Controller by Rockwellautomation
Easergy C5 Firmware by Schneider Electric
Easergy T300 Firmware by Schneider Electric
Epas Gtw Firmware by Schneider Electric
Epas Gtw Firmware by Schneider Electric
Isagraf Free Runtime by Rockwellautomation
Isagraf Runtime by Rockwellautomation
Micom C264 Firmware by Schneider Electric
Micro810 Firmware by Rockwellautomation
Micro820 Firmware by Rockwellautomation
Micro830 Firmware by Rockwellautomation
Micro850 Firmware by Rockwellautomation
Micro870 Firmware by Rockwellautomation
Pacis Gtw Firmware by Schneider Electric
Pacis Gtw Firmware by Schneider Electric
Pacis Gtw Firmware by Schneider Electric
Pacis Gtw Firmware by Schneider Electric
Pacis Gtw Firmware by Schneider Electric
Saitel Dp Firmware by Schneider Electric
Saitel Dr Firmware by Schneider Electric
Scd2200 Firmware by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain administrative access to industrial control systems, potentially disrupting operations, manipulating processes, or causing physical damage.
Likely Case
Unauthorized users access sensitive credentials, leading to privilege escalation, lateral movement within OT networks, and potential data theft.
If Mitigated
With proper access controls and network segmentation, impact is limited to local information disclosure without system compromise.
🎯 Exploit Status
Exploitation requires local access to read plaintext password files. No special tools or skills needed beyond file access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 6.0 or later
Vendor Advisory: https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
Restart Required: Yes
Instructions:
1. Download ISaGRAF Runtime version 6.0 or later from Rockwell Automation. 2. Backup current configuration. 3. Install the updated version. 4. Restart the system. 5. Verify password files are encrypted.
🔧 Temporary Workarounds
Restrict File Access Permissions
allSet strict file permissions on password files to prevent unauthorized reading
chmod 600 password_file (Linux)
icacls password_file /deny Everyone:(R) (Windows)
Move Password Files
allRelocate password files to protected directories with restricted access
mv password_file /secure/location/ (Linux)
move password_file C:\secure\location\ (Windows)
🧯 If You Can't Patch
- Implement strict access controls to limit who can access the system locally
- Segment the network to isolate ISaGRAF systems from untrusted networks
🔍 How to Verify
Check if Vulnerable:
Check if password files exist in the same directory as ISaGRAF executable and contain plaintext credentials
Check Version:
isagraf -v or check program properties for version information
Verify Fix Applied:
Verify password files are encrypted or moved to secure locations after patching
📡 Detection & Monitoring
Log Indicators:
- Unauthorized file access attempts to password files
- Multiple failed authentication attempts followed by successful login
Network Indicators:
- Unusual authentication traffic from unexpected sources
- Lateral movement attempts within OT network
SIEM Query:
source="isagraf" AND (event_type="file_access" AND file_path="*password*")
🔗 References
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04
- https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
- https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-04
- https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1131699
- https://www.cisa.gov/uscert/ics/advisories/icsa-20-280-01
- https://www.xylem.com/siteassets/about-xylem/cybersecurity/advisories/xylem-multismart-rockwell-isagraf.pdf