CVE-2024-10497

8.8 HIGH

📋 TL;DR

This CVE describes an authorization bypass vulnerability in Schneider Electric devices where authenticated attackers can manipulate HTTPS requests to modify data beyond their assigned privileges. This allows elevation of privileges on affected systems. Organizations using vulnerable Schneider Electric products are affected.

💻 Affected Systems

Products:
  • Schneider Electric products listed in SEVD-2025-014-08
Versions: Specific versions listed in vendor advisory
Operating Systems: Embedded/device-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the device's web interface via HTTPS

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain administrative control over critical industrial control systems, potentially disrupting operations, modifying configurations, or accessing sensitive data.

🟠

Likely Case

Attackers with basic user accounts could escalate privileges to perform unauthorized actions like modifying device settings, accessing restricted data, or disrupting normal operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact would be limited to isolated systems with minimal operational disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of device API and ability to craft modified HTTPS requests

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in SEVD-2025-014-08

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-08&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-08.pdf

Restart Required: No

Instructions:

1. Download the firmware update from Schneider Electric's website. 2. Follow vendor's specific upgrade instructions for your device model. 3. Verify the update was successful by checking the firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices from untrusted networks and limit access to authorized users only

Access Control Hardening

all

Implement strict role-based access controls and monitor for unusual privilege escalation attempts

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices
  • Enforce strong authentication and monitor for unusual HTTPS request patterns

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vulnerable versions listed in SEVD-2025-014-08

Check Version:

Device-specific command via web interface or CLI (consult device documentation)

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTPS requests from authenticated users
  • Privilege escalation attempts in audit logs
  • Configuration changes from non-admin accounts

Network Indicators:

  • Modified HTTPS requests to device management interfaces
  • Unusual API calls from authenticated sessions

SIEM Query:

source="device_logs" AND (http_method="POST" OR http_method="PUT") AND uri CONTAINS "/api/" AND user_role!="admin" AND status="200"

🔗 References

📤 Share & Export