CVE-2020-7556

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through an out-of-bounds write when a malicious CGF file is imported into IGSS Definition software. Attackers can exploit this to execute arbitrary code on affected systems. Organizations using Schneider Electric's IGSS Definition version 14.0.0.20247 are affected.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition
Versions: Version 14.0.0.20247
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires user to import malicious CGF file; typically used in industrial control system environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the IGSS Definition host, potentially leading to lateral movement within industrial control networks.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate data, or disrupt industrial operations.

🟢

If Mitigated

Limited impact if proper network segmentation and file validation controls prevent malicious file imports.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to import malicious file; ZDI advisory suggests weaponization is likely given the RCE impact.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 14.0.0.20248 or later

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-315-03/

Restart Required: Yes

Instructions:

1. Download updated IGSS Definition from Schneider Electric portal. 2. Install update following vendor instructions. 3. Restart system to complete installation.

🔧 Temporary Workarounds

Restrict CGF file imports

windows

Block import of CGF files through application controls or user training

Network segmentation

all

Isolate IGSS systems from untrusted networks

🧯 If You Can't Patch

  • Implement strict file validation for CGF imports
  • Restrict IGSS Definition to trusted users only and monitor for suspicious file imports

🔍 How to Verify

Check if Vulnerable:

Check IGSS Definition version in Help > About; if version is 14.0.0.20247, system is vulnerable.

Check Version:

Check application version through Help > About menu in IGSS Definition

Verify Fix Applied:

Verify version is 14.0.0.20248 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CGF file import events
  • Process creation from IGSS Definition executable

Network Indicators:

  • Unexpected outbound connections from IGSS systems
  • File transfers to IGSS hosts

SIEM Query:

Process creation where parent process contains 'def.exe' AND command line contains unusual parameters

🔗 References

📤 Share & Export