CVE-2024-0865

7.8 HIGH

📋 TL;DR

This vulnerability involves hard-coded credentials in Schneider Electric software that allow local privilege escalation. Non-administrative users can exploit these credentials to gain administrative privileges on affected systems. Organizations using vulnerable Schneider Electric products are affected.

💻 Affected Systems

Products:
  • Schneider Electric products (specific products not detailed in provided references)
Versions: Not specified in provided references
Operating Systems: Windows (implied from privilege escalation context)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configurations. Exact product list requires checking Schneider Electric advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access gains full administrative control, potentially compromising the entire system, installing malware, or accessing sensitive data.

🟠

Likely Case

A malicious insider or compromised low-privilege account escalates to administrator, enabling unauthorized configuration changes or data access.

🟢

If Mitigated

With proper access controls and monitoring, exploitation would be detected and contained before significant damage occurs.

🌐 Internet-Facing: LOW (requires local access to exploit)
🏢 Internal Only: HIGH (any internal user with local access could exploit)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access but is technically simple once credentials are discovered.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in provided references

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-03.pdf

Restart Required: Yes

Instructions:

1. Download patch from Schneider Electric advisory. 2. Apply patch following vendor instructions. 3. Restart affected systems.

🔧 Temporary Workarounds

Restrict Local Access

all

Limit physical and remote local access to vulnerable systems to trusted users only.

Monitor Privilege Escalation Attempts

windows

Enable auditing for privilege escalation events and failed authentication attempts.

auditpol /set /subcategory:"Privilege Use" /success:enable /failure:enable

🧯 If You Can't Patch

  • Implement strict access controls to limit who can log in locally to vulnerable systems.
  • Monitor system logs for suspicious privilege escalation attempts and failed authentication using hard-coded credentials.

🔍 How to Verify

Check if Vulnerable:

Check if affected Schneider Electric software versions are installed. Consult vendor advisory for specific version details.

Check Version:

Check software version through vendor-specific method (varies by product).

Verify Fix Applied:

Verify patch installation via vendor-provided verification method or version check.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts with hard-coded usernames
  • Unexpected privilege escalation events
  • Administrative actions from non-admin accounts

Network Indicators:

  • Local authentication attempts from unexpected sources

SIEM Query:

EventID=4625 AND TargetUserName IN (hardcoded_usernames) OR EventID=4672 AND SubjectUserName NOT IN (admin_accounts)

🔗 References

📤 Share & Export