CVE-2024-35293

9.1 CRITICAL

📋 TL;DR

CVE-2024-35293 is a critical missing authentication vulnerability in Schneider Electric devices that allows unauthenticated remote attackers to reboot or factory reset affected equipment. This can cause denial of service and permanent data loss. Organizations using vulnerable Schneider Electric industrial control systems and network equipment are affected.

💻 Affected Systems

Products:
  • Schneider Electric industrial control systems and network equipment (specific models in vendor advisory)
Versions: Multiple versions prior to vendor patches
Operating Systems: Embedded/RTOS systems on Schneider devices
Default Config Vulnerable: ⚠️ Yes
Notes: Default configurations are vulnerable. Requires network access to affected devices.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device wipe and permanent data loss across multiple critical infrastructure devices, causing extended downtime and operational disruption.

🟠

Likely Case

Unauthenticated attackers reboot multiple devices causing temporary service disruption and potential configuration loss.

🟢

If Mitigated

Impact limited to isolated test/dev environments with proper network segmentation and authentication controls.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation means internet-exposed devices are immediately vulnerable to attack.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be attacked without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple unauthenticated HTTP requests can trigger the vulnerability. No special tools or skills required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric Security Advisory SAR-202405-1 for specific patched versions

Vendor Advisory: https://www.schneider-elektronik.de/wp-content/uploads/2024/07/SAR-202405-1.pdf

Restart Required: Yes

Instructions:

1. Review Schneider Electric Security Advisory SAR-202405-1. 2. Identify affected devices. 3. Apply vendor-provided firmware updates. 4. Restart devices. 5. Verify patch application.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in separate network segments with strict firewall rules

Access Control Lists

all

Implement strict IP-based access controls to limit device access to authorized management systems only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from untrusted networks
  • Deploy network monitoring and intrusion detection to alert on unauthorized reboot/reset attempts

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vulnerable versions listed in Schneider Electric advisory SAR-202405-1

Check Version:

Device-specific commands vary by product - consult device documentation or web interface

Verify Fix Applied:

Verify firmware version matches patched versions in vendor advisory and test authentication requirements for device management functions

📡 Detection & Monitoring

Log Indicators:

  • Unexpected device reboots
  • Factory reset events
  • Unauthenticated access attempts to management interfaces

Network Indicators:

  • HTTP requests to device management endpoints without authentication
  • Unusual traffic patterns to industrial control devices

SIEM Query:

source="industrial_device" AND (event="reboot" OR event="factory_reset") AND NOT user="authenticated_user"

🔗 References

📤 Share & Export