CVE-2025-13844

5.3 MEDIUM

📋 TL;DR

A double free vulnerability in Rapsody software allows attackers to cause heap memory corruption by tricking users into importing malicious SSD project files. This affects all Rapsody users who import untrusted project files. The vulnerability could lead to application crashes or potentially arbitrary code execution.

💻 Affected Systems

Products:
  • Rapsody
Versions: Specific versions not detailed in reference; likely multiple versions affected based on CWE-415 pattern
Operating Systems: Windows, Linux (if Rapsody supports)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when importing SSD project files. All installations with SSD import functionality are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the Rapsody application user, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial of service when processing malicious SSD files, with potential for limited code execution.

🟢

If Mitigated

Application instability or crashes without code execution if memory corruption doesn't lead to exploitable conditions.

🌐 Internet-Facing: MEDIUM - Requires user interaction to import malicious files, but files could be distributed via email or websites.
🏢 Internal Only: MEDIUM - Similar risk internally if users import files from untrusted sources within the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to import malicious file. Double free vulnerabilities can be challenging to weaponize reliably but are serious memory corruption issues.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in reference; check Schneider Electric advisory for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-013-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-013-04.pdf

Restart Required: Yes

Instructions:

1. Download the latest Rapsody version from Schneider Electric. 2. Install the update following vendor instructions. 3. Restart the application and any related services. 4. Verify the patch is applied by checking version.

🔧 Temporary Workarounds

Restrict SSD file imports

all

Configure Rapsody to block or warn on SSD file imports from untrusted sources

User training and policies

all

Implement policies prohibiting import of untrusted project files and train users on risks

🧯 If You Can't Patch

  • Implement application whitelisting to prevent execution of malicious code if exploitation occurs
  • Use network segmentation to isolate Rapsody systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check if Rapsody version is before the patched version specified in Schneider Electric advisory SEVD-2026-013-04

Check Version:

Check within Rapsody application: Help → About or version command in installation directory

Verify Fix Applied:

Verify Rapsody version matches or exceeds the patched version from the vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes when importing SSD files
  • Memory access violation errors in application logs
  • Unexpected process termination

Network Indicators:

  • Downloads of SSD files from untrusted sources
  • Unusual outbound connections after file import

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="Rapsody.exe" AND (Message LIKE "%access violation%" OR Message LIKE "%heap corruption%")

🔗 References

📤 Share & Export