Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-22797 : Vulnerability Insights and Analysis

Discover the impacts of CVE-2021-22797, a CWE-22 vulnerability allowing unauthorized script deployment by Schneider Electric. Learn about affected products and mitigation strategies.

A CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal) vulnerability exists that could cause malicious script to be deployed in an unauthorized location and may result in code execution on the engineering workstation when a malicious project file is loaded in the engineering software.

Understanding CVE-2021-22797

This CVE affects products from Schneider Electric, including EcoStruxure Control Expert, EcoStruxure Process Expert, and SCADAPack RemoteConnect for x70. The vulnerability could lead to unauthorized code execution on the workstation.

What is CVE-2021-22797?

The CVE-2021-22797 is a CWE-22 vulnerability that allows malicious scripts to be placed in unauthorized areas, potentially leading to code execution when loading a harmful project file.

The Impact of CVE-2021-22797

The impact of this vulnerability is rated as HIGH. It can compromise the confidentiality, integrity, and availability of the affected systems, with no privileges required for exploitation and user interaction being necessary.

Technical Details of CVE-2021-22797

This vulnerability has a CVSS v3.1 base score of 7.8, with low attack complexity and local attack vector. The affected systems include EcoStruxure Control Expert (up to V15.0 SP1), EcoStruxure Process Expert (up to 2020), and all versions of SCADAPack RemoteConnect for x70.

Vulnerability Description

The vulnerability is due to improper pathname limitation, allowing unauthorized script deployment, potentially leading to code execution.

Affected Systems and Versions

EcoStruxure Control Expert up to V15.0 SP1, EcoStruxure Process Expert up to 2020, and all versions of SCADAPack RemoteConnect for x70 are impacted.

Exploitation Mechanism

Malicious actors can exploit this vulnerability by loading a malicious project file in the affected engineering software.

Mitigation and Prevention

To mitigate the risk associated with CVE-2021-22797, immediate steps need to be taken on affected systems, followed by long-term security practices and timely patching and updates.

Immediate Steps to Take

Ensure all users exercise caution when loading project files and consider restricting access to potentially risky directories.

Long-Term Security Practices

Regularly update software and apply security patches as soon as they are released to ensure protection against known vulnerabilities.

Patching and Updates

Schneider Electric may provide patches or updates to address this vulnerability. Stay updated with the latest security advisories from the vendor to protect your systems.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now