CVE-2021-22762

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through path traversal in Schneider Electric's IGSS Definition software. Attackers can exploit it by tricking users into opening malicious CGF or WSP files, potentially gaining full control of affected systems. Organizations using IGSS Definition versions 15.0.0.21140 and earlier are at risk.

💻 Affected Systems

Products:
  • Schneider Electric IGSS Definition (Def.exe)
Versions: V15.0.0.21140 and prior versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the file parsing functionality when handling CGF or WSP files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining administrative privileges, data theft, lateral movement within network, and disruption of industrial operations.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to industrial control systems, potential manipulation of SCADA operations, and data exfiltration.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious files, but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial control systems often have privileged access and could be targeted via internal spear-phishing or compromised engineering workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious file. No public exploit code available at time of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than V15.0.0.21140

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-01

Restart Required: Yes

Instructions:

1. Download latest IGSS Definition update from Schneider Electric portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart system. 5. Verify version is updated.

🔧 Temporary Workarounds

Restrict file execution

windows

Block execution of CGF and WSP files from untrusted sources

Use Windows Group Policy to restrict file associations for .cgf and .wsp extensions

User awareness training

all

Train users to avoid opening untrusted CGF/WSP files

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized executables
  • Segment IGSS systems from general network and restrict file transfers

🔍 How to Verify

Check if Vulnerable:

Check IGSS Definition version via Help > About in application or examine file properties of Def.exe

Check Version:

Right-click Def.exe > Properties > Details tab, or run: wmic datafile where name='C:\Program Files\IGSS\Def.exe' get version

Verify Fix Applied:

Confirm version is newer than V15.0.0.21140 and test file parsing with known safe CGF/WSP files

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from Def.exe
  • File access errors in IGSS logs
  • Unusual network connections from IGSS systems

Network Indicators:

  • Unusual outbound connections from IGSS workstations
  • File transfers to/from IGSS systems

SIEM Query:

Process Creation where Image contains 'Def.exe' AND CommandLine contains '.cgf' OR CommandLine contains '.wsp'

🔗 References

📤 Share & Export