CVE-2022-24324

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on affected IGSS Data Server systems by sending specially crafted messages that trigger a stack-based buffer overflow. Organizations using IGSS Data Server versions prior to V15.0.0.22073 are affected, particularly those in industrial control and SCADA environments.

💻 Affected Systems

Products:
  • IGSS Data Server (IGSSdataServer.exe)
Versions: All versions prior to V15.0.0.22073
Operating Systems: Windows (as IGSS is Windows-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the IGSS Data Server component used in Schneider Electric's IGSS SCADA/HMI software for industrial automation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with full system compromise, allowing attackers to take control of the IGSS Data Server, potentially disrupting industrial operations or pivoting to other systems.

🟠

Likely Case

Remote code execution leading to data theft, system manipulation, or installation of persistent malware in industrial control environments.

🟢

If Mitigated

Denial of service or system crashes if exploit attempts are blocked by network controls, but no code execution.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-exposed systems extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated remote exploitation, posing significant risk to internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability description indicates remote exploitation without authentication is possible, and buffer overflow vulnerabilities are often relatively straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V15.0.0.22073 or later

Vendor Advisory: https://download.schneider-electric.com/files?p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-102-01_IGSS_Security_Notification_V2.0.pdf

Restart Required: Yes

Instructions:

1. Download the updated IGSS Data Server version V15.0.0.22073 or later from Schneider Electric. 2. Stop the IGSS Data Server service. 3. Install the update following vendor instructions. 4. Restart the service and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate IGSS Data Server from untrusted networks and restrict access to authorized systems only.

Firewall Rules

all

Block external access to IGSS Data Server ports and restrict internal access to necessary systems.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the vulnerable system from all untrusted networks
  • Deploy intrusion prevention systems (IPS) with signatures for buffer overflow attacks and monitor for exploit attempts

🔍 How to Verify

Check if Vulnerable:

Check the version of IGSSdataServer.exe by examining file properties or running the IGSS Data Server and checking its version information.

Check Version:

Right-click IGSSdataServer.exe → Properties → Details tab, or check version information within the IGSS application interface.

Verify Fix Applied:

Verify that IGSSdataServer.exe version is V15.0.0.22073 or higher after applying the update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual network connections to IGSS Data Server
  • Service crashes or restarts of IGSSdataServer.exe
  • Unexpected process creation from IGSS Data Server

Network Indicators:

  • Unusual traffic patterns to IGSS Data Server ports
  • Malformed packets or buffer overflow attempts directed at the service

SIEM Query:

source="*IGSS*" AND (event_type="crash" OR event_type="buffer_overflow" OR dest_port="[IGSS_PORT]" AND suspicious_payload)

🔗 References

📤 Share & Export