CVE-2021-22760

7.8 HIGH

📋 TL;DR

This vulnerability in Schneider Electric's IGSS Definition software allows attackers to execute arbitrary code or cause data loss by importing a malicious CGF file. It affects IGSS Definition (Def.exe) version 15.0.0.21140 and earlier. Organizations using this industrial control system software for SCADA/HMI applications are at risk.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition (Def.exe)
Versions: V15.0.0.21140 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the IGSS Definition component used for configuring IGSS SCADA/HMI systems. Requires user interaction to import malicious CGF files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/administrator privileges leading to complete system compromise, data destruction, or disruption of industrial processes.

🟠

Likely Case

Data loss or corruption of IGSS configuration files, potentially disrupting SCADA/HMI operations.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls in place.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires file import, internet-facing IGSS systems could be targeted through phishing or web interfaces.
🏢 Internal Only: HIGH - Industrial control systems often have high-privilege access and direct process control capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to import malicious CGF files. No public exploit code has been disclosed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V15.0.0.21141 or later

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01

Restart Required: Yes

Instructions:

1. Download the updated version from Schneider Electric's website. 2. Backup current IGSS configurations. 3. Install the update following vendor instructions. 4. Restart the system. 5. Verify the version is 15.0.0.21141 or higher.

🔧 Temporary Workarounds

Restrict CGF file imports

windows

Implement application whitelisting to prevent unauthorized CGF file imports

Using AppLocker or similar: New-AppLockerPolicy -RuleType Publisher,Path -User Everyone -Action Deny

Network segmentation

all

Isolate IGSS systems from untrusted networks and implement strict firewall rules

🧯 If You Can't Patch

  • Implement strict user access controls to limit who can import CGF files
  • Deploy file integrity monitoring to detect unauthorized CGF file modifications

🔍 How to Verify

Check if Vulnerable:

Check IGSS Definition version by right-clicking Def.exe → Properties → Details tab, or check installed programs in Control Panel.

Check Version:

wmic product where name="IGSS Definition" get version

Verify Fix Applied:

Verify version is 15.0.0.21141 or higher using the same method as checking vulnerability.

📡 Detection & Monitoring

Log Indicators:

  • Failed CGF file import attempts
  • Unexpected process crashes of Def.exe
  • Unusual file creation in IGSS directories

Network Indicators:

  • Unexpected network connections from IGSS systems
  • File transfers to IGSS systems containing CGF extensions

SIEM Query:

source="windows" AND (process="def.exe" AND (event_id="1000" OR file_extension=".cgf"))

🔗 References

📤 Share & Export