CVE-2021-32975

7.8 HIGH

📋 TL;DR

CVE-2021-32975 is an out-of-bounds read vulnerability in Cscape software that could allow remote code execution when parsing malicious project files. Attackers could exploit this to execute arbitrary code with the privileges of the current user. All Cscape versions prior to 9.90 SP5 are affected.

💻 Affected Systems

Products:
  • Cscape
Versions: All versions prior to 9.90 SP5
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects Cscape software used for programming and configuring Eaton's C-more and ELC soft PLCs in industrial environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment on affected systems.

🟠

Likely Case

Local privilege escalation or denial of service through application crashes when processing malicious project files.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation controls in place.

🌐 Internet-Facing: MEDIUM - Requires user interaction to open malicious project files, but could be delivered via phishing or compromised websites.
🏢 Internal Only: HIGH - Industrial control systems using Cscape are often critical infrastructure with limited security controls.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious project files. No public exploits were available at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.90 SP5 and later

Vendor Advisory: https://us-cert.cisa.gov/ics/advisories/icsa-21-224-02

Restart Required: Yes

Instructions:

1. Download Cscape version 9.90 SP5 or later from Eaton's official website. 2. Run the installer with administrative privileges. 3. Follow installation prompts. 4. Restart the system after installation completes.

🔧 Temporary Workarounds

Restrict project file sources

all

Only open project files from trusted sources and implement file validation procedures.

Network segmentation

all

Isolate Cscape systems from untrusted networks and implement strict firewall rules.

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized code
  • Use least privilege principles and run Cscape with minimal user permissions

🔍 How to Verify

Check if Vulnerable:

Check Cscape version via Help > About menu. If version is below 9.90 SP5, system is vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version is 9.90 SP5 or higher in Help > About menu after patching.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when opening project files
  • Unusual process creation from Cscape executable

Network Indicators:

  • Unexpected network connections from Cscape process
  • Downloads of project files from untrusted sources

SIEM Query:

Process Creation where Image contains 'cscape.exe' AND CommandLine contains unusual parameters

🔗 References

📤 Share & Export