Schneider Electric Building Operation Automation Server Vulnerability
Act Now7.2ICS-CERT ICSA-16-061-01Dec 3, 2016
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary
Schneider Electric Automation Server versions 1.7.0 and earlier contain a command injection vulnerability (CWE-78) that allows an authenticated administrator to execute arbitrary OS commands. The vulnerability has a CVSS score of 7.2 (high severity) with a 14.0% exploitation probability score. No vendor patch is available for this product. Affected organizations should implement network access controls and credential management to reduce the risk of exploitation by privileged users.
What this means
What could happen
An attacker with administrator credentials could execute arbitrary commands on the Automation Server, potentially altering building control logic, disrupting HVAC or lighting systems, or causing equipment damage through unsafe state changes.
Who's at risk
Building operations teams managing Schneider Electric Automation Server deployments in energy facilities, including those operating HVAC, lighting, and environmental controls. Organizations relying on this server for coordinated building-wide automation and energy management.
How it could be exploited
An attacker with valid administrator credentials connects to the Automation Server and injects arbitrary OS commands through a vulnerability in command processing. The attacker then executes those commands with the privileges of the Automation Server process, gaining full control over building automation logic.
Prerequisites
- Administrator-level credentials for the Automation Server
- Network access to the Automation Server management interface
- Knowledge of a command injection vector in the server interface
High CVSS score (7.2)High EPSS score (14.0%)No patch availableRequires administrator credentials but affects critical building control logicCommand injection severity (CWE-78)
Exploitability
High exploit probability (EPSS 14.0%)
Affected products (1)
ProductAffected VersionsFix Status
Automation Server: <=V1.7.0≤ V1.7.0No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/2HARDENINGRestrict network access to the Automation Server to trusted engineering workstations and management networks using firewall rules; block unauthorized access attempts
HARDENINGEnforce strong administrator passwords and implement multi-factor authentication where supported for Automation Server access
Mitigations - no patch available
0/2Automation Server: <=V1.7.0 has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGMonitor and audit administrator activity and command execution logs on the Automation Server for unauthorized changes
HARDENINGSegment the Automation Server onto a separate management VLAN isolated from operational networks and corporate IT
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/831408a3-5fc9-4434-b0ca-b311b6d1e503