CVE-2024-5056

6.5 MEDIUM

📋 TL;DR

This CVE describes a CWE-552 vulnerability where specific files or directories are accessible to external parties in Schneider Electric devices. If exploited, it can prevent firmware updates and disrupt webserver functionality when those files are removed. Affected systems are Schneider Electric devices with vulnerable firmware versions.

💻 Affected Systems

Products:
  • Schneider Electric Modicon M580
  • Schneider Electric Modicon M340
  • Schneider Electric Modicon Premium
  • Schneider Electric Modicon Quantum
Versions: Specific firmware versions as listed in SEVD-2024-163-01
Operating Systems: Embedded RTOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web server functionality enabled. Requires network access to the device.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical files, causing permanent device malfunction, preventing firmware updates, and disrupting operational technology systems.

🟠

Likely Case

Unauthorized access leads to deletion of specific files, disrupting firmware update processes and causing temporary webserver outages.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to denial of service for update functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device's web interface but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to SEVD-2024-163-01 for specific patched firmware versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-01.pdf

Restart Required: Yes

Instructions:

1. Download patched firmware from Schneider Electric. 2. Backup device configuration. 3. Apply firmware update following vendor instructions. 4. Verify update success and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices in dedicated network segments with strict firewall rules.

Disable Web Interface

all

Turn off web server functionality if not required for operations.

🧯 If You Can't Patch

  • Implement strict network access controls to limit device exposure
  • Monitor device logs for unauthorized access attempts to web interface

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against vulnerable versions listed in SEVD-2024-163-01

Check Version:

Device-specific command via web interface or configuration tool

Verify Fix Applied:

Verify firmware version matches patched versions from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to web interface
  • File deletion events in system logs
  • Failed firmware update attempts

Network Indicators:

  • Unusual HTTP requests to device web interface
  • Traffic patterns indicating file enumeration

SIEM Query:

source="device_logs" AND (event="file_deletion" OR event="unauthorized_access")

🔗 References

📤 Share & Export