CVE-2021-22823

9.1 CRITICAL

📋 TL;DR

CVE-2021-22823 is an authentication bypass vulnerability in Schneider Electric's Interactive Graphical SCADA System Data Collector (dc.exe) that allows unauthenticated attackers to delete arbitrary files on affected systems. This affects IGSS Data Collector versions 15.0.0.21320 and earlier. Industrial control system operators using vulnerable SCADA installations are at risk.

💻 Affected Systems

Products:
  • Interactive Graphical SCADA System Data Collector (dc.exe)
Versions: V15.0.0.21320 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the Data Collector component of IGSS SCADA systems. The vulnerability is in network message handling without proper authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, leading to SCADA system failure and potential physical process disruption in industrial environments.

🟠

Likely Case

Data loss, service disruption, or system instability through targeted file deletion attacks against the SCADA environment.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent unauthorized access to the Data Collector service.

🌐 Internet-Facing: HIGH - If exposed to internet, attackers can directly exploit without authentication to delete files.
🏢 Internal Only: HIGH - Even internally, any network-accessible instance can be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access to the Data Collector service but no authentication. Attack complexity is low due to missing authentication checks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Update to version newer than V15.0.0.21320

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-01

Restart Required: Yes

Instructions:

1. Download the updated IGSS Data Collector from Schneider Electric. 2. Stop the Data Collector service. 3. Install the update. 4. Restart the service. 5. Verify the version is newer than V15.0.0.21320.

🔧 Temporary Workarounds

Network Segmentation

windows

Restrict network access to the Data Collector service to only trusted systems

Windows Firewall: New-NetFirewallRule -DisplayName "Block IGSS DC" -Direction Inbound -Protocol TCP -LocalPort 12401 -Action Block

Service Account Hardening

windows

Run the Data Collector service with minimal privileges to limit file deletion impact

sc.exe config "IGSS Data Collector" obj= "NT AUTHORITY\LocalService" password= ""

🧯 If You Can't Patch

  • Implement strict network access controls to isolate the Data Collector from untrusted networks
  • Deploy host-based intrusion detection to monitor for file deletion attempts and unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check the version of dc.exe in the IGSS installation directory. If version is 15.0.0.21320 or earlier, the system is vulnerable.

Check Version:

Right-click dc.exe → Properties → Details → File version

Verify Fix Applied:

Verify the dc.exe version is newer than 15.0.0.21320 and test that file deletion via network messages is no longer possible without authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletion events in Windows Event Logs
  • Failed authentication attempts to Data Collector service
  • Unusual network connections to port 12401

Network Indicators:

  • Unusual traffic patterns to Data Collector port (default 12401)
  • Network messages to dc.exe from unauthorized sources

SIEM Query:

source="windows" AND (event_id=4663 OR event_id=4656) AND process_name="dc.exe" AND object_type="File" AND access_mask="DELETE"

🔗 References

📤 Share & Export