CVE-2020-7528

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution on Schneider Electric SCADAPack 7x Remote Connect software through malicious project files. Attackers can craft .PRJ files containing serialized payloads that execute arbitrary code when loaded. Organizations using SCADAPack 7x Remote Connect versions V3.6.3.574 and earlier are affected.

💻 Affected Systems

Products:
  • Schneider Electric SCADAPack 7x Remote Connect
Versions: V3.6.3.574 and all prior versions
Operating Systems: Windows (software runs on Windows)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the project file loading mechanism; any installation using .PRJ files is vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of SCADA systems, allowing attackers to manipulate industrial processes, disrupt operations, or cause physical damage to equipment.

🟠

Likely Case

Attackers gain control of the SCADAPack device to modify configurations, steal sensitive industrial data, or disrupt monitoring/control functions.

🟢

If Mitigated

Limited impact if proper network segmentation and file validation controls prevent malicious .PRJ files from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires file interaction, internet-facing SCADA systems could be targeted through social engineering or compromised updates.
🏢 Internal Only: HIGH - Internal attackers or compromised workstations could easily exploit this by loading malicious project files on vulnerable systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to get a malicious .PRJ file loaded by the software, which typically requires some level of access or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V3.6.3.575 or later

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-252-01/

Restart Required: Yes

Instructions:

1. Download the updated version from Schneider Electric's website. 2. Backup existing projects and configurations. 3. Uninstall the vulnerable version. 4. Install the patched version. 5. Restart the system. 6. Verify functionality with test projects.

🔧 Temporary Workarounds

Restrict .PRJ file sources

all

Only allow loading of .PRJ files from trusted, authenticated sources and implement file integrity checking.

Network segmentation

all

Isolate SCADAPack systems from general network access and restrict file transfer capabilities.

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized users from loading project files
  • Deploy application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check the software version in Help > About; if version is V3.6.3.574 or earlier, the system is vulnerable.

Check Version:

Check via GUI: Help > About in SCADAPack Remote Connect software

Verify Fix Applied:

After patching, verify the version shows V3.6.3.575 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected .PRJ file loading events
  • Process creation from SCADAPack software
  • Error logs related to project file parsing

Network Indicators:

  • Unusual file transfers to SCADAPack systems
  • Network connections from SCADAPack to unexpected destinations

SIEM Query:

source="scadapack" AND (event="project_load" OR process_creation) AND user NOT IN ["authorized_users"]

🔗 References

📤 Share & Export