Discover the impacts of CVE-2021-22797, a CWE-22 vulnerability allowing unauthorized script deployment by Schneider Electric. Learn about affected products and mitigation strategies.
A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) vulnerability exists that could cause malicious script to be deployed in an unauthorized location and may result in code execution on the engineering workstation when a malicious project file is loaded in the engineering software.
Understanding CVE-2021-22797
This CVE affects products from Schneider Electric, including EcoStruxure Control Expert, EcoStruxure Process Expert, and SCADAPack RemoteConnect for x70. The vulnerability could lead to unauthorized code execution on the workstation.
What is CVE-2021-22797?
The CVE-2021-22797 is a CWE-22 vulnerability that allows malicious scripts to be placed in unauthorized areas, potentially leading to code execution when loading a harmful project file.
The Impact of CVE-2021-22797
The impact of this vulnerability is rated as HIGH. It can compromise the confidentiality, integrity, and availability of the affected systems, with no privileges required for exploitation and user interaction being necessary.
Technical Details of CVE-2021-22797
This vulnerability has a CVSS v3.1 base score of 7.8, with low attack complexity and local attack vector. The affected systems include EcoStruxure Control Expert (up to V15.0 SP1), EcoStruxure Process Expert (up to 2020), and all versions of SCADAPack RemoteConnect for x70.
Vulnerability Description
The vulnerability is due to improper pathname limitation, allowing unauthorized script deployment, potentially leading to code execution.
Affected Systems and Versions
EcoStruxure Control Expert up to V15.0 SP1, EcoStruxure Process Expert up to 2020, and all versions of SCADAPack RemoteConnect for x70 are impacted.
Exploitation Mechanism
Malicious actors can exploit this vulnerability by loading a malicious project file in the affected engineering software.
Mitigation and Prevention
To mitigate the risk associated with CVE-2021-22797, immediate steps need to be taken on affected systems, followed by long-term security practices and timely patching and updates.
Immediate Steps to Take
Ensure all users exercise caution when loading project files and consider restricting access to potentially risky directories.
Long-Term Security Practices
Regularly update software and apply security patches as soon as they are released to ensure protection against known vulnerabilities.
Patching and Updates
Schneider Electric may provide patches or updates to address this vulnerability. Stay updated with the latest security advisories from the vendor to protect your systems.