CVE-2023-27981

7.8 HIGH

📋 TL;DR

This vulnerability allows remote code execution through path traversal in Schneider Electric's IGSS software. An attacker can craft a malicious report file that, when opened by a victim, executes arbitrary code on the system. Affected users include anyone running vulnerable versions of IGSS Data Server, IGSS Dashboard, or Custom Reports components.

💻 Affected Systems

Products:
  • IGSS Data Server (IGSSdataServer.exe)
  • IGSS Dashboard (DashBoard.exe)
  • Custom Reports (RMS16.dll)
Versions: V16.0.0.23040 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default. The vulnerability is present in the Custom Reports component but affects the entire IGSS suite.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to unauthorized access to sensitive industrial control system data and potential disruption of operations.

🟢

If Mitigated

Limited impact with proper network segmentation and user privilege restrictions, potentially only affecting the specific IGSS application context.

🌐 Internet-Facing: MEDIUM - While the vulnerability requires user interaction (opening a malicious report), internet-facing systems could be targeted through social engineering or compromised websites.
🏢 Internal Only: HIGH - Internal networks with IGSS deployments are prime targets for lateral movement and industrial control system compromise.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction (opening a malicious report file), but the path traversal mechanism is straightforward once the malicious file is executed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after V16.0.0.23040

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-073-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-073-04.pdf

Restart Required: Yes

Instructions:

1. Download the latest version from Schneider Electric's official website
2. Backup existing configurations and data
3. Uninstall the vulnerable version
4. Install the updated version
5. Restart the system
6. Verify the installation and restore configurations

🔧 Temporary Workarounds

Restrict Report File Execution

windows

Block execution of custom report files from untrusted sources

Network Segmentation

all

Isolate IGSS systems from general network traffic and internet access

🧯 If You Can't Patch

  • Implement strict file validation for all report files before opening
  • Apply principle of least privilege to IGSS application users and service accounts

🔍 How to Verify

Check if Vulnerable:

Check the version of IGSSDataServer.exe, DashBoard.exe, or RMS16.dll. If version is 16.0.0.23040 or earlier, the system is vulnerable.

Check Version:

Right-click on IGSSDataServer.exe → Properties → Details tab → File version

Verify Fix Applied:

Verify that all IGSS components are updated to versions after 16.0.0.23040 and that the patch installation was successful.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in IGSS logs
  • Execution of unexpected processes from IGSS context
  • Failed attempts to access restricted directories

Network Indicators:

  • Unusual network connections originating from IGSS systems
  • Unexpected file transfers involving report files

SIEM Query:

Process creation events where parent process contains 'IGSS' or 'Dashboard' and child process is unexpected system command

🔗 References

📤 Share & Export