CVE-2020-7518
📋 TL;DR
This vulnerability allows attackers to modify project configuration files in Schneider Electric's Easergy Builder software due to improper input validation. Attackers could potentially alter system configurations, disrupt operations, or introduce malicious changes. Organizations using Easergy Builder version 1.4.7.2 or older are affected.
💻 Affected Systems
- Schneider Electric Easergy Builder
📦 What is this software?
Easergy Builder by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify critical configuration files to disrupt industrial control systems, cause operational downtime, or introduce malicious logic into energy management systems.
Likely Case
Attackers with access to the system could modify project files to change operational parameters, potentially affecting energy distribution or equipment behavior.
If Mitigated
With proper access controls and file integrity monitoring, impact would be limited to unauthorized configuration changes that could be detected and reverted.
🎯 Exploit Status
Exploitation requires access to modify project files, likely through existing system access or social engineering
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 1.4.7.3 or newer
Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-161-05
Restart Required: Yes
Instructions:
1. Download the latest version from Schneider Electric's website. 2. Uninstall the current version. 3. Install the updated version. 4. Restart the system.
🔧 Temporary Workarounds
Restrict file access permissions
windowsSet strict file permissions on Easergy Builder project directories to prevent unauthorized modifications
icacls "C:\Program Files\Easergy Builder\Projects" /deny Everyone:(F)
icacls "C:\ProgramData\Easergy Builder\Projects" /deny Everyone:(F)
Implement file integrity monitoring
allMonitor project configuration files for unauthorized changes using file integrity monitoring tools
🧯 If You Can't Patch
- Implement strict access controls to limit who can modify project files
- Regularly audit and verify configuration file integrity
🔍 How to Verify
Check if Vulnerable:
Check the software version in Help > About in Easergy Builder or examine the installed program version in Windows Programs and Features
Check Version:
wmic product where name="Easergy Builder" get version
Verify Fix Applied:
Verify the installed version is 1.4.7.3 or newer and test that project files cannot be maliciously modified
📡 Detection & Monitoring
Log Indicators:
- Unexpected modifications to .eprj or other Easergy project files
- Failed access attempts to project directories
Network Indicators:
- Unusual file transfer activity involving Easergy project files
SIEM Query:
source="windows" AND (event_id=4663 OR event_id=4656) AND object_name="*.eprj"