Schneider Electric CNM
ConneXium Network Manager (CNM) contains a vulnerability that allows arbitrary command execution when a malicious .cxn project file is loaded. The vulnerability exists because Edit Mode is enabled by default with no password protection, allowing any loaded project to modify the CNM database and execute commands. The vulnerability is not remotely exploitable and requires a user to load a malicious project file into the CNM software on a local workstation. Schneider Electric has not released a patch and recommends users apply the Alarms Disabler Tool to preprocess project files and enable Edit Mode password protection.
- Local access to a workstation running ConneXium Network Manager
- User must load a malicious .cxn project file into CNM
- Edit Mode must be enabled (default condition)
- No Edit Mode password protection must be set (default condition)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e9e7c49b-116f-4e48-8ebd-773d4c0cac87Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.