CVE-2021-22750

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code or cause data loss by exploiting an out-of-bounds write flaw in Schneider Electric's IGSS Definition software. Attackers can achieve this by tricking users into importing a malicious CGF file. Organizations using IGSS Definition versions 15.0.0.21041 and earlier are affected.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition (Def.exe)
Versions: V15.0.0.21041 and prior
Operating Systems: Windows (as IGSS is Windows-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is triggered when importing CGF files, which is a normal function of the software.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, potentially leading to complete system compromise, data theft, or disruption of industrial operations.

🟠

Likely Case

Application crash and data loss from corrupted files, with potential for limited code execution in the context of the IGSS Definition process.

🟢

If Mitigated

No impact if malicious CGF files are prevented from reaching vulnerable systems through proper security controls.

🌐 Internet-Facing: MEDIUM - Requires user interaction to import malicious file, but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial control systems often have direct file transfer capabilities and may lack endpoint protection.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to import malicious file. Exploit development requires understanding of CGF file format and memory corruption techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after V15.0.0.21041

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01

Restart Required: Yes

Instructions:

1. Download updated IGSS Definition software from Schneider Electric. 2. Install the update following vendor instructions. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Restrict CGF file imports

windows

Block or restrict the ability to import CGF files through application policies or user training.

Application whitelisting

windows

Implement application control to prevent execution of unauthorized or modified IGSS Definition components.

🧯 If You Can't Patch

  • Implement strict file validation for CGF imports using external tools or scripts
  • Isolate IGSS Definition systems from untrusted networks and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check IGSS Definition version by right-clicking Def.exe → Properties → Details tab, or check installed programs in Control Panel.

Check Version:

wmic product where name="IGSS Definition" get version

Verify Fix Applied:

Verify version is newer than V15.0.0.21041 and test CGF file import functionality with known safe files.

📡 Detection & Monitoring

Log Indicators:

  • Failed CGF file imports
  • Application crashes in IGSS Definition logs
  • Unusual process creation from Def.exe

Network Indicators:

  • Unexpected file transfers to IGSS systems
  • Network traffic patterns indicating file import attempts

SIEM Query:

source="*IGSS*" AND (event_id=1000 OR event_id=1001) AND process_name="Def.exe"

🔗 References

📤 Share & Export