CVE-2020-7528
📋 TL;DR
This vulnerability allows remote code execution on Schneider Electric SCADAPack 7x Remote Connect software through malicious project files. Attackers can craft .PRJ files containing serialized payloads that execute arbitrary code when loaded. Organizations using SCADAPack 7x Remote Connect versions V3.6.3.574 and earlier are affected.
💻 Affected Systems
- Schneider Electric SCADAPack 7x Remote Connect
📦 What is this software?
Scadapack 7x Remote Connect by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of SCADA systems, allowing attackers to manipulate industrial processes, disrupt operations, or cause physical damage to equipment.
Likely Case
Attackers gain control of the SCADAPack device to modify configurations, steal sensitive industrial data, or disrupt monitoring/control functions.
If Mitigated
Limited impact if proper network segmentation and file validation controls prevent malicious .PRJ files from reaching vulnerable systems.
🎯 Exploit Status
Exploitation requires the attacker to get a malicious .PRJ file loaded by the software, which typically requires some level of access or social engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V3.6.3.575 or later
Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-252-01/
Restart Required: Yes
Instructions:
1. Download the updated version from Schneider Electric's website. 2. Backup existing projects and configurations. 3. Uninstall the vulnerable version. 4. Install the patched version. 5. Restart the system. 6. Verify functionality with test projects.
🔧 Temporary Workarounds
Restrict .PRJ file sources
allOnly allow loading of .PRJ files from trusted, authenticated sources and implement file integrity checking.
Network segmentation
allIsolate SCADAPack systems from general network access and restrict file transfer capabilities.
🧯 If You Can't Patch
- Implement strict access controls to prevent unauthorized users from loading project files
- Deploy application whitelisting to prevent execution of unauthorized code
🔍 How to Verify
Check if Vulnerable:
Check the software version in Help > About; if version is V3.6.3.574 or earlier, the system is vulnerable.
Check Version:
Check via GUI: Help > About in SCADAPack Remote Connect software
Verify Fix Applied:
After patching, verify the version shows V3.6.3.575 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Unexpected .PRJ file loading events
- Process creation from SCADAPack software
- Error logs related to project file parsing
Network Indicators:
- Unusual file transfers to SCADAPack systems
- Network connections from SCADAPack to unexpected destinations
SIEM Query:
source="scadapack" AND (event="project_load" OR process_creation) AND user NOT IN ["authorized_users"]