CVE-2021-22754

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to execute arbitrary code or cause data loss on systems running vulnerable versions of Schneider Electric's IGSS Definition software. Attack occurs when a malicious CGF file is imported into the Def.exe application. Organizations using IGSS Definition V15.0.0.21140 or earlier are affected.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition (Def.exe)
Versions: V15.0.0.21140 and all prior versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation when processing CGF files through Def.exe.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/administrator privileges leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash and data loss from file corruption, with potential for limited code execution in user context.

🟢

If Mitigated

Application crash without code execution if memory protections like ASLR/DEP are effective.

🌐 Internet-Facing: LOW - Requires user interaction to import malicious file, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Attack requires internal access or social engineering to deliver malicious file.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user to import malicious CGF file; exploitation depends on bypassing memory protections.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V15.0.0.21141 or later

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01

Restart Required: Yes

Instructions:

1. Download updated version from Schneider Electric portal. 2. Backup configuration files. 3. Run installer as administrator. 4. Restart system after installation.

🔧 Temporary Workarounds

Restrict CGF file imports

windows

Block import of CGF files through application policies or user training

Application whitelisting

windows

Use AppLocker or similar to restrict execution of Def.exe to trusted users only

🧯 If You Can't Patch

  • Implement strict file validation for CGF imports
  • Restrict network access to IGSS systems and monitor for suspicious file activity

🔍 How to Verify

Check if Vulnerable:

Check Def.exe version in Help > About; if version is 15.0.0.21140 or lower, system is vulnerable.

Check Version:

Right-click Def.exe > Properties > Details tab, or check Help > About in application

Verify Fix Applied:

Verify version is 15.0.0.21141 or higher in Help > About dialog.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of Def.exe
  • Unusual file import activity in application logs

Network Indicators:

  • Unexpected file transfers to IGSS systems
  • Anomalous outbound connections from IGSS hosts

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="Def.exe"

🔗 References

📤 Share & Export