CVE-2024-2747

7.8 HIGH

📋 TL;DR

CVE-2024-2747 is an unquoted search path vulnerability in Schneider Electric's Easergy Studio software that allows local authenticated users to escalate privileges by placing malicious executables in directories with spaces in their names. This affects users running vulnerable versions of Easergy Studio on Windows systems. Attackers can gain SYSTEM-level access by exploiting the way Windows handles executable paths.

💻 Affected Systems

Products:
  • Schneider Electric Easergy Studio
Versions: All versions prior to V2.0.1
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS and local authenticated access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM privileges, allowing installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation from standard user to SYSTEM/administrator on the affected machine, enabling further attacks.

🟢

If Mitigated

Limited to user-level access with proper file permissions and security controls in place.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring authenticated access to the system.
🏢 Internal Only: HIGH - Internal attackers or compromised user accounts can exploit this to gain full system control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local authenticated access and ability to create files in specific directories. Exploitation is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.0.1

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-100-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-100-01.pdf

Restart Required: Yes

Instructions:

1. Download Easergy Studio V2.0.1 from Schneider Electric's official website. 2. Uninstall previous versions. 3. Install V2.0.1. 4. Restart the system.

🔧 Temporary Workarounds

Restrict File Creation Permissions

windows

Limit write permissions to directories in the Easergy Studio installation path to prevent malicious file placement.

icacls "C:\Program Files\Easergy Studio" /deny Users:(OI)(CI)W

Remove Spaces from Installation Path

windows

Reinstall Easergy Studio to a directory path without spaces to mitigate the unquoted search path issue.

🧯 If You Can't Patch

  • Implement strict file permissions on Easergy Studio directories to prevent unauthorized file creation
  • Monitor for suspicious file creation in Easergy Studio directories and privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check Easergy Studio version in Help > About. If version is below V2.0.1, the system is vulnerable.

Check Version:

Check 'Help > About' in Easergy Studio GUI or examine installation directory properties

Verify Fix Applied:

Verify Easergy Studio version is V2.0.1 or higher in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing privilege escalation attempts
  • File creation events in Easergy Studio directories by non-admin users

Network Indicators:

  • Unusual outbound connections from systems running Easergy Studio

SIEM Query:

EventID=4688 AND ProcessName LIKE '%easergy%' AND NewProcessName='cmd.exe' OR EventID=4688 AND ProcessName LIKE '%easergy%' AND IntegrityLevel='System'

🔗 References

📤 Share & Export