ZigBee Installation Toolkit
Monitor6.6SEVD-2020-070-03Mar 10, 2020
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Schneider Electric ZigBee Installation Toolkit versions prior to 1.0.1 contain a privilege escalation vulnerability (CWE-426: Untrusted Search Path) that allows local code execution with elevated privileges. The vulnerability requires local access and user interaction but could allow compromise of toolkit configuration or malicious modification of ZigBee device settings.
What this means
What could happen
An attacker with access to a workstation running the ZigBee Installation Toolkit could gain local code execution and escalate privileges, potentially allowing them to compromise configuration or deployment of ZigBee devices in your building automation or energy management systems.
Who's at risk
Energy sector organizations using Schneider Electric's ZigBee Installation Toolkit for configuring and deploying ZigBee wireless devices in building automation, lighting control, or HVAC systems on engineering workstations.
How it could be exploited
An attacker with physical or local network access to an engineering workstation running the vulnerable ZigBee Installation Toolkit (<1.0.1) could exploit the untrusted search path or similar mechanism to execute arbitrary code with elevated privileges during toolkit operation.
Prerequisites
- Local or adjacent network access to an engineering workstation
- ZigBee Installation Toolkit version earlier than 1.0.1 installed and in use
- User interaction required (toolkit must be launched or performing operations)
Local access requiredUser interaction neededLow complexity attackAffects engineering workstation, not production devices
Exploitability
Low exploit probability (EPSS 0.1%)
Affected products (1)
ProductAffected VersionsFix Status
ZigBee Installation Kit<1.0.11.0.1
Remediation & Mitigation
0/1
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate ZigBee Installation Toolkit to version 1.0.1 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/5d241851-9ae0-4a8b-b23d-31dd456bc37c