CVE-2020-7572

8.8 HIGH

📋 TL;DR

This XXE vulnerability in EcoStruxure Building Operation WebReports allows authenticated remote attackers to inject malicious XML entities, potentially leading to data disclosure, denial of service, or server-side request forgery. It affects versions 1.9 through 3.1 of the software. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • EcoStruxure Building Operation WebReports
Versions: V1.9 - V3.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to exploit. Affects the WebReports component specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise including sensitive data exfiltration, server-side request forgery to internal systems, and denial of service rendering the system unusable.

🟠

Likely Case

Unauthorized access to sensitive configuration files, internal network reconnaissance via SSRF, and potential data leakage from the server.

🟢

If Mitigated

Limited impact with proper network segmentation, XML parser hardening, and authentication controls in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access and knowledge of XML injection techniques. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.2 and later

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2020-315-04/

Restart Required: Yes

Instructions:

1. Download the updated version from Schneider Electric's official portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the WebReports service. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Disable External Entity Processing

all

Configure the XML parser to disable external entity resolution and DTD processing

Modify XML parser configuration to set features: FEATURE_SECURE_PROCESSING=true, disallow-doctype-decl=true

Network Segmentation

all

Isolate WebReports server from sensitive internal networks and internet

Configure firewall rules to restrict outbound connections from WebReports server

🧯 If You Can't Patch

  • Implement strict authentication controls and monitor for suspicious XML uploads
  • Deploy WAF with XXE protection rules and input validation for XML content

🔍 How to Verify

Check if Vulnerable:

Check WebReports version in administration interface or via installed programs list. Versions 1.9-3.1 are vulnerable.

Check Version:

Check via WebReports web interface at /admin or examine installed programs in Windows Control Panel

Verify Fix Applied:

Verify version is 3.2 or later in administration interface and test XML upload functionality with XXE payloads.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML file uploads
  • Failed authentication attempts followed by XML requests
  • Outbound connections from WebReports to unexpected internal systems

Network Indicators:

  • HTTP POST requests with XML content containing external entity references
  • Unusual outbound connections from WebReports server

SIEM Query:

source="webreports" AND (message="*xml*" OR message="*entity*" OR message="*DOCTYPE*")

🔗 References

📤 Share & Export