CVE-2022-36969
📋 TL;DR
This XXE vulnerability in AVEVA Edge 2020 allows attackers to read sensitive files from the system when users open malicious documents. Attackers can exploit this to steal configuration files, credentials, or other sensitive data. Only installations of AVEVA Edge 2020 SP2 Patch 0 are affected.
💻 Affected Systems
- AVEVA Edge 2020
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise through credential theft, configuration file exfiltration, and potential lateral movement within the network.
Likely Case
Sensitive file disclosure including configuration files, local user data, and potentially credentials stored in accessible locations.
If Mitigated
Limited impact with proper network segmentation and user awareness training preventing malicious document execution.
🎯 Exploit Status
Exploitation requires user interaction but is technically simple once malicious document is opened. ZDI advisory suggests weaponization is likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Later versions than SP2 Patch 0
Vendor Advisory: https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf
Restart Required: Yes
Instructions:
1. Download latest AVEVA Edge 2020 update from official vendor portal. 2. Backup current configuration. 3. Install update following vendor instructions. 4. Restart system. 5. Verify version is updated.
🔧 Temporary Workarounds
Disable external entity processing
allConfigure XML parser to disable external entity resolution
Set XML parser properties: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true
Restrict file types
windowsBlock opening of untrusted XML-based documents
🧯 If You Can't Patch
- Implement strict user awareness training about opening untrusted documents
- Network segmentation to isolate AVEVA Edge systems from sensitive data stores
🔍 How to Verify
Check if Vulnerable:
Check AVEVA Edge version in Help > About. If version is exactly 4201.2111.1802.0000, system is vulnerable.
Check Version:
In AVEVA Edge: Help > About displays version information
Verify Fix Applied:
Verify version is different from 4201.2111.1802.0000 after patching. Test with safe XXE payload to confirm parser blocks external entities.
📡 Detection & Monitoring
Log Indicators:
- Unusual file access patterns from AVEVA Edge process
- Multiple failed attempts to access system files
- XML parsing errors with external entity references
Network Indicators:
- Outbound connections to unusual URIs during document processing
- Data exfiltration patterns from AVEVA Edge system
SIEM Query:
process_name="AVEVA Edge" AND (file_access_denied OR xml_parsing_error)
🔗 References
- https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-22-1128/
- https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-22-1128/