CVE-2024-12476

7.8 HIGH

📋 TL;DR

This XXE vulnerability in Schneider Electric's Web Designer configuration tool allows attackers to read sensitive files or potentially execute remote code by tricking users into importing malicious XML files. It affects users of Schneider Electric's workstation software who process XML files through this tool. The vulnerability requires user interaction but can lead to significant system compromise.

💻 Affected Systems

Products:
  • Schneider Electric Web Designer configuration tool
Versions: Specific versions not detailed in provided reference; consult vendor advisory for exact affected versions.
Operating Systems: Windows (based on typical Schneider Electric workstation software deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when importing crafted XML files into the Web Designer tool. Requires user interaction to open malicious files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to full workstation compromise, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Information disclosure of local files including configuration files, credentials, or sensitive system information.

🟢

If Mitigated

Limited impact with proper network segmentation, user training, and file validation controls in place.

🌐 Internet-Facing: LOW - Requires user interaction with malicious XML files, not directly internet-exposed.
🏢 Internal Only: MEDIUM - Internal users could be tricked into importing malicious files via phishing or shared drives.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious XML files to users. No authentication bypass needed if user opens the file.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult SEVD-2025-014-04 for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-014-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-014-04.pdf

Restart Required: No

Instructions:

1. Download and install the patched version from Schneider Electric's official portal. 2. Verify installation by checking version numbers against advisory. 3. Test XML import functionality to ensure proper operation.

🔧 Temporary Workarounds

Disable XML external entity processing

all

Configure XML parsers to disable external entity resolution if supported by the application.

Application-specific configuration; consult vendor documentation

Restrict XML file sources

all

Implement policies to only allow XML imports from trusted sources and validate file integrity.

Implement file hash verification or digital signatures for XML files

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of unauthorized processes
  • Restrict user permissions to limit file system access and reduce impact of information disclosure

🔍 How to Verify

Check if Vulnerable:

Check if Web Designer tool version matches affected versions listed in SEVD-2025-014-04 advisory.

Check Version:

Check application 'About' dialog or consult vendor documentation for version query commands.

Verify Fix Applied:

Verify installed version is newer than affected versions and test XML import with safe test files.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML import operations, file access errors, or process creation from Web Designer tool

Network Indicators:

  • Outbound connections to unexpected external IPs following XML file imports

SIEM Query:

Process creation events from Web Designer executable followed by network connections or file access patterns

🔗 References

📤 Share & Export