CVE-2020-7480

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to view files on the application server filesystem by injecting malicious code into XML data processed by Andover Continuum building management systems. It affects all versions of Andover Continuum, potentially exposing sensitive configuration files and system data.

💻 Affected Systems

Products:
  • Andover Continuum
Versions: All versions
Operating Systems: Windows-based systems running Andover Continuum
Default Config Vulnerable: ⚠️ Yes
Notes: This affects the core XML processing functionality of Andover Continuum building management systems.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the building management system, unauthorized access to sensitive files including credentials and configuration data, and potential lateral movement to other systems.

🟠

Likely Case

Unauthorized viewing of system files containing configuration data, credentials, or other sensitive information stored on the application server.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external attackers from reaching vulnerable systems.

🌐 Internet-Facing: HIGH - If exposed to the internet, attackers can directly exploit this vulnerability without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability to access sensitive files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires XML data manipulation but does not require authentication, making it relatively straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to latest version as specified in Schneider Electric advisory

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-070-04/

Restart Required: Yes

Instructions:

1. Download the security update from Schneider Electric's website. 2. Apply the patch following vendor instructions. 3. Restart the Andover Continuum application server. 4. Verify the patch was successfully applied.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Andover Continuum systems from untrusted networks and the internet

XML Input Validation

all

Implement XML schema validation and input sanitization for all XML data processed by the system

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to Andover Continuum systems
  • Monitor for unusual XML processing activity and file access attempts

🔍 How to Verify

Check if Vulnerable:

Check if running any version of Andover Continuum without the security update applied

Check Version:

Check version through Andover Continuum administration interface or system documentation

Verify Fix Applied:

Verify the system is running the patched version and test XML processing functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML processing errors
  • Unexpected file access attempts
  • Malformed XML input patterns

Network Indicators:

  • Unusual XML traffic to Andover Continuum systems
  • External connections attempting XML injection

SIEM Query:

source="andover_continuum" AND (event_type="xml_error" OR file_access="unexpected")

🔗 References

📤 Share & Export