CVE-2024-37036

9.8 CRITICAL

📋 TL;DR

CVE-2024-37036 is an out-of-bounds write vulnerability in Schneider Electric products that allows authentication bypass when attackers send malformed POST requests under specific configurations. This affects Schneider Electric systems with particular parameter settings, potentially exposing critical infrastructure to unauthorized access.

💻 Affected Systems

Products:
  • Schneider Electric products listed in SEVD-2024-163-05 advisory
Versions: Specific versions detailed in Schneider Electric advisory SEVD-2024-163-05
Operating Systems: Embedded systems/industrial controllers
Default Config Vulnerable: ✅ No
Notes: Requires specific configuration parameters to be set for vulnerability to be exploitable

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to bypass authentication, gain administrative access, and potentially execute arbitrary code on affected Schneider Electric devices.

🟠

Likely Case

Authentication bypass leading to unauthorized access to control systems, configuration modification, and potential disruption of industrial operations.

🟢

If Mitigated

Limited impact with proper network segmentation, authentication controls, and monitoring in place to detect and block malicious requests.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed POST requests to vulnerable endpoints with specific configuration parameters enabled

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions specified in Schneider Electric advisory SEVD-2024-163-05

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-05.pdf

Restart Required: Yes

Instructions:

1. Review Schneider Electric advisory SEVD-2024-163-05. 2. Identify affected products and versions. 3. Apply vendor-provided patches or firmware updates. 4. Restart affected systems as required. 5. Verify patch application and system functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected Schneider Electric systems from untrusted networks and internet access

Configuration Hardening

all

Disable or modify the specific configuration parameters that enable this vulnerability

🧯 If You Can't Patch

  • Implement strict network access controls to limit access to affected systems
  • Enable comprehensive logging and monitoring for authentication bypass attempts

🔍 How to Verify

Check if Vulnerable:

Check system version against affected versions in Schneider Electric advisory SEVD-2024-163-05 and verify specific configuration parameters are set

Check Version:

Vendor-specific command to check firmware/software version (consult product documentation)

Verify Fix Applied:

Verify system version is updated to patched version specified in vendor advisory and test authentication functionality

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful access
  • Malformed POST requests to authentication endpoints
  • Unusual authentication patterns

Network Indicators:

  • Malformed HTTP POST requests to Schneider Electric system endpoints
  • Traffic patterns indicating authentication bypass attempts

SIEM Query:

source="schneider_system" AND (http_method="POST" AND http_status="200" AND (uri CONTAINS "auth" OR uri CONTAINS "login") AND request_size>threshold)

🔗 References

📤 Share & Export