CVE-2023-4516

7.8 HIGH

📋 TL;DR

A local attacker can change the update source in IGSS Update Service without authentication, potentially leading to remote code execution by forcing updates with malicious content. This affects systems running vulnerable versions of Schneider Electric's IGSS software. The vulnerability requires local access to the system.

💻 Affected Systems

Products:
  • Schneider Electric IGSS (Interactive Graphical SCADA System)
Versions: All versions prior to IGSS Version 16.0.0.23040
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects IGSS Update Service component specifically. Industrial control systems using IGSS are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with system-level privileges, allowing complete compromise of the industrial control system.

🟠

Likely Case

Unauthorized modification of update sources leading to installation of malicious software or denial of service.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing local attacker access.

🌐 Internet-Facing: LOW - The vulnerability requires local access to the system.
🏢 Internal Only: HIGH - Local attackers on the same network could exploit this to gain control of industrial systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires local access but no authentication. The vulnerability is in the update service authentication mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: IGSS Version 16.0.0.23040 and later

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-255-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-255-01.pdf

Restart Required: Yes

Instructions:

1. Download IGSS Version 16.0.0.23040 or later from Schneider Electric. 2. Stop IGSS services. 3. Install the update. 4. Restart services and verify functionality.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit local access to IGSS systems to authorized personnel only using network segmentation and access controls.

Disable Unnecessary Services

windows

Disable IGSS Update Service if automatic updates are not required in your environment.

sc stop "IGSS Update Service"
sc config "IGSS Update Service" start= disabled

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate IGSS systems from untrusted networks.
  • Apply principle of least privilege and restrict local access to authorized personnel only.

🔍 How to Verify

Check if Vulnerable:

Check IGSS version in Control Panel > Programs and Features. Versions below 16.0.0.23040 are vulnerable.

Check Version:

wmic product where name="IGSS" get version

Verify Fix Applied:

Verify installed version is 16.0.0.23040 or higher and that the IGSS Update Service is running with proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to IGSS Update Service
  • Unexpected update source changes in IGSS logs

Network Indicators:

  • Unusual network traffic from IGSS systems to non-standard update servers

SIEM Query:

source="IGSS" AND (event_type="update_source_change" OR auth_failure="true")

🔗 References

📤 Share & Export