CVE-2024-5680

7.1 HIGH

📋 TL;DR

A local privilege escalation vulnerability in the Foxboro.sys driver allows authenticated attackers to cause denial-of-service through improper array index validation. This affects systems running Schneider Electric Foxboro software with vulnerable driver versions. Attackers need local user access to exploit this vulnerability.

💻 Affected Systems

Products:
  • Schneider Electric Foxboro Control Systems
Versions: Specific versions not detailed in advisory; refer to vendor documentation
Operating Systems: Windows (driver-specific vulnerability)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Foxboro.sys driver installation; industrial control systems in critical infrastructure environments

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system crash or kernel panic leading to sustained denial-of-service, requiring physical intervention to restore functionality.

🟠

Likely Case

Temporary system instability or application crashes affecting Foxboro control system operations until system restart.

🟢

If Mitigated

Minimal impact with proper access controls preventing unauthorized local users from executing malicious IOCTL calls.

🌐 Internet-Facing: LOW - Requires local user access, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users with local access could disrupt critical control systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local user access and ability to craft specific IOCTL calls; driver-level exploitation requires understanding of kernel interactions

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric advisory SEVD-2024-191-02 for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-191-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-191-02.pdf

Restart Required: Yes

Instructions:

1. Download patch from Schneider Electric portal 2. Backup system 3. Apply patch following vendor instructions 4. Restart system 5. Verify driver version

🔧 Temporary Workarounds

Restrict Local User Access

windows

Limit local user accounts and implement least privilege access controls

Driver Permission Hardening

windows

Modify driver permissions to restrict non-administrative IOCTL access

sc sdset Foxboro D:(A;;CCLCSWRPWPDTLOCRRC;;;SY)(A;;CCDCLCSWRPWPDTLOCRSDRCWDWO;;;BA)(A;;CCLCSWLOCRRC;;;IU)(A;;CCLCSWLOCRRC;;;SU)

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized local user execution
  • Monitor for unusual driver IOCTL activity and system crashes

🔍 How to Verify

Check if Vulnerable:

Check Foxboro.sys driver version and compare against patched versions in vendor advisory

Check Version:

driverquery /v | findstr Foxboro

Verify Fix Applied:

Verify driver version matches patched version from vendor advisory and test system stability

📡 Detection & Monitoring

Log Indicators:

  • System crashes, kernel panics, unexpected driver restarts
  • Event ID 41 (Kernel-Power) with bugcheck codes
  • Increased IOCTL calls to Foxboro.sys

Network Indicators:

  • Not applicable - local exploitation only

SIEM Query:

EventID=41 OR (Source="System" AND EventID=7036 AND "Foxboro") OR (EventID=4663 AND ObjectName="*Foxboro*")

🔗 References

📤 Share & Export