CVE-2021-22758

7.8 HIGH

📋 TL;DR

This vulnerability in Schneider Electric IGSS Definition software allows attackers to execute arbitrary code or cause data loss by importing a malicious CGF file. It affects IGSS Definition (Def.exe) version 15.0.0.21140 and earlier. Industrial control system operators using this software for SCADA/HMI configuration are at risk.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition (Def.exe)
Versions: V15.0.0.21140 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the IGSS Definition component used for configuring SCADA/HMI systems. Requires user interaction to import malicious CGF file.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges leading to complete system compromise, data destruction, or disruption of industrial operations.

🟠

Likely Case

Data corruption or loss in IGSS projects, potential denial of service affecting SCADA/HMI configuration capabilities.

🟢

If Mitigated

Limited impact if file import functionality is restricted or monitored, with potential for failed import attempts only.

🌐 Internet-Facing: MEDIUM - Requires malicious file import, but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial networks often have less security monitoring, and legitimate users could inadvertently import malicious files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering or compromised file sources to deliver malicious CGF file. User must import the file in IGSS Definition.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after V15.0.0.21140

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01

Restart Required: Yes

Instructions:

1. Download updated IGSS Definition from Schneider Electric. 2. Backup existing configurations. 3. Install the update following vendor instructions. 4. Restart the system.

🔧 Temporary Workarounds

Restrict CGF file imports

windows

Implement application whitelisting to prevent execution of Def.exe or restrict import of CGF files through group policy.

User training and file validation

all

Train users to only import CGF files from trusted sources and implement file hash validation for imported files.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IGSS Definition systems from untrusted networks.
  • Deploy application control solutions to prevent execution of unauthorized code and monitor for suspicious file import activities.

🔍 How to Verify

Check if Vulnerable:

Check IGSS Definition version by right-clicking Def.exe → Properties → Details tab, or check installed programs in Control Panel.

Check Version:

wmic product where name like "%IGSS%" get version

Verify Fix Applied:

Verify version is newer than V15.0.0.21140 and test importing known-good CGF files to ensure functionality.

📡 Detection & Monitoring

Log Indicators:

  • Failed CGF file import attempts
  • Unexpected Def.exe crashes
  • Unusual process creation from Def.exe

Network Indicators:

  • Unexpected file downloads to IGSS systems
  • Network connections from Def.exe to suspicious IPs

SIEM Query:

process_name="Def.exe" AND (event_id=1000 OR file_extension=".cgf")

🔗 References

📤 Share & Export