CVE-2020-7480
📋 TL;DR
This vulnerability allows attackers to view files on the application server filesystem by injecting malicious code into XML data processed by Andover Continuum building management systems. It affects all versions of Andover Continuum, potentially exposing sensitive configuration files and system data.
💻 Affected Systems
- Andover Continuum
📦 What is this software?
Andover Continuum 5720 Firmware by Schneider Electric
Andover Continuum 5740 Firmware by Schneider Electric
Andover Continuum 9200 Firmware by Schneider Electric
Andover Continuum 9680 Firmware by Schneider Electric
Andover Continuum 9702 Firmware by Schneider Electric
Andover Continuum 9900 Firmware by Schneider Electric
Andover Continuum 9924 Firmware by Schneider Electric
Andover Continuum 9940 Firmware by Schneider Electric
Andover Continuum 9941 Firmware by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the building management system, unauthorized access to sensitive files including credentials and configuration data, and potential lateral movement to other systems.
Likely Case
Unauthorized viewing of system files containing configuration data, credentials, or other sensitive information stored on the application server.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external attackers from reaching vulnerable systems.
🎯 Exploit Status
The vulnerability requires XML data manipulation but does not require authentication, making it relatively straightforward to exploit.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Update to latest version as specified in Schneider Electric advisory
Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-070-04/
Restart Required: Yes
Instructions:
1. Download the security update from Schneider Electric's website. 2. Apply the patch following vendor instructions. 3. Restart the Andover Continuum application server. 4. Verify the patch was successfully applied.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Andover Continuum systems from untrusted networks and the internet
XML Input Validation
allImplement XML schema validation and input sanitization for all XML data processed by the system
🧯 If You Can't Patch
- Implement strict network access controls to limit access to Andover Continuum systems
- Monitor for unusual XML processing activity and file access attempts
🔍 How to Verify
Check if Vulnerable:
Check if running any version of Andover Continuum without the security update applied
Check Version:
Check version through Andover Continuum administration interface or system documentation
Verify Fix Applied:
Verify the system is running the patched version and test XML processing functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual XML processing errors
- Unexpected file access attempts
- Malformed XML input patterns
Network Indicators:
- Unusual XML traffic to Andover Continuum systems
- External connections attempting XML injection
SIEM Query:
source="andover_continuum" AND (event_type="xml_error" OR file_access="unexpected")