CVE-2020-7518

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to modify project configuration files in Schneider Electric's Easergy Builder software due to improper input validation. Attackers could potentially alter system configurations, disrupt operations, or introduce malicious changes. Organizations using Easergy Builder version 1.4.7.2 or older are affected.

💻 Affected Systems

Products:
  • Schneider Electric Easergy Builder
Versions: Version 1.4.7.2 and older
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability affects project configuration file handling in the software

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify critical configuration files to disrupt industrial control systems, cause operational downtime, or introduce malicious logic into energy management systems.

🟠

Likely Case

Attackers with access to the system could modify project files to change operational parameters, potentially affecting energy distribution or equipment behavior.

🟢

If Mitigated

With proper access controls and file integrity monitoring, impact would be limited to unauthorized configuration changes that could be detected and reverted.

🌐 Internet-Facing: LOW with brief explanation
🏢 Internal Only: MEDIUM with brief explanation

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires access to modify project files, likely through existing system access or social engineering

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.4.7.3 or newer

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-161-05

Restart Required: Yes

Instructions:

1. Download the latest version from Schneider Electric's website. 2. Uninstall the current version. 3. Install the updated version. 4. Restart the system.

🔧 Temporary Workarounds

Restrict file access permissions

windows

Set strict file permissions on Easergy Builder project directories to prevent unauthorized modifications

icacls "C:\Program Files\Easergy Builder\Projects" /deny Everyone:(F)
icacls "C:\ProgramData\Easergy Builder\Projects" /deny Everyone:(F)

Implement file integrity monitoring

all

Monitor project configuration files for unauthorized changes using file integrity monitoring tools

🧯 If You Can't Patch

  • Implement strict access controls to limit who can modify project files
  • Regularly audit and verify configuration file integrity

🔍 How to Verify

Check if Vulnerable:

Check the software version in Help > About in Easergy Builder or examine the installed program version in Windows Programs and Features

Check Version:

wmic product where name="Easergy Builder" get version

Verify Fix Applied:

Verify the installed version is 1.4.7.3 or newer and test that project files cannot be maliciously modified

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to .eprj or other Easergy project files
  • Failed access attempts to project directories

Network Indicators:

  • Unusual file transfer activity involving Easergy project files

SIEM Query:

source="windows" AND (event_id=4663 OR event_id=4656) AND object_name="*.eprj"

🔗 References

📤 Share & Export