CVE-2024-35293
📋 TL;DR
CVE-2024-35293 is a critical missing authentication vulnerability in Schneider Electric devices that allows unauthenticated remote attackers to reboot or factory reset affected equipment. This can cause denial of service and permanent data loss. Organizations using vulnerable Schneider Electric industrial control systems and network equipment are affected.
💻 Affected Systems
- Schneider Electric industrial control systems and network equipment (specific models in vendor advisory)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device wipe and permanent data loss across multiple critical infrastructure devices, causing extended downtime and operational disruption.
Likely Case
Unauthenticated attackers reboot multiple devices causing temporary service disruption and potential configuration loss.
If Mitigated
Impact limited to isolated test/dev environments with proper network segmentation and authentication controls.
🎯 Exploit Status
Simple unauthenticated HTTP requests can trigger the vulnerability. No special tools or skills required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Schneider Electric Security Advisory SAR-202405-1 for specific patched versions
Vendor Advisory: https://www.schneider-elektronik.de/wp-content/uploads/2024/07/SAR-202405-1.pdf
Restart Required: Yes
Instructions:
1. Review Schneider Electric Security Advisory SAR-202405-1. 2. Identify affected devices. 3. Apply vendor-provided firmware updates. 4. Restart devices. 5. Verify patch application.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices in separate network segments with strict firewall rules
Access Control Lists
allImplement strict IP-based access controls to limit device access to authorized management systems only
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices from untrusted networks
- Deploy network monitoring and intrusion detection to alert on unauthorized reboot/reset attempts
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vulnerable versions listed in Schneider Electric advisory SAR-202405-1
Check Version:
Device-specific commands vary by product - consult device documentation or web interface
Verify Fix Applied:
Verify firmware version matches patched versions in vendor advisory and test authentication requirements for device management functions
📡 Detection & Monitoring
Log Indicators:
- Unexpected device reboots
- Factory reset events
- Unauthenticated access attempts to management interfaces
Network Indicators:
- HTTP requests to device management endpoints without authentication
- Unusual traffic patterns to industrial control devices
SIEM Query:
source="industrial_device" AND (event="reboot" OR event="factory_reset") AND NOT user="authenticated_user"