Schneider Electric PowerLogic HDPM6000 Authorization Bypass Through User-Controlled Key (CVE-2024-10497)

high Tenable OT Security Plugin ID 502850

Synopsis

The remote OT asset is affected by a vulnerability.

Description

CWE-639: Authorization Bypass Through User-Controlled Key vulnerability exists that could allow an authorized attacker to modify values outside those defined by their privileges (Elevation of Privileges) when the attacker sends modified HTTPS requests to the device.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

The following text was originally created by the Cybersecurity and Infrastructure Security Agency (CISA). The original can be found at CISA.gov.

Schneider Electric has identified the following specific workarounds and mitigations users can apply to reduce risk:

- Schneider Electric Power Logic HDPM6000 Version 0.62.7 only: Version v0.62.11 and newer of HDPM6000 includes a fix for these vulnerabilities and is available for download.
A device restart will occur as part of the firmware update process if conducted through the web user interface.
If the upgrade is performed using the HDPM6000 Manager software, the device will need to be restarted manually to apply the update.(CVE-2024-10497)

- Schneider Electric Power Logic HDPM6000 Version 0.62.7 only:
If users choose not to apply the remediation provided above, they should immediately apply the following mitigations to reduce the risk of exploit:
Ensure that the device is not accessible via the HTTPS protocol outside the local network segment by applying appropriate firewalls configuration and controls, and that access to the network segment is protected and controlled.

For more information, please see Schneider Electric's advisory.

See Also

http://www.nessus.org/u?bda75d44

https://www.cisa.gov/news-events/ics-advisories/icsa-25-028-02

Plugin Details

Severity: High

ID: 502850

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 2/17/2025

Updated: 2/19/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:schneider-electric:powerlogic_hdpm6000_firmware

Required KB Items: Tenable.ot/Schneider

Exploit Ease: No known exploits are available

Patch Publication Date: 1/17/2025

Vulnerability Publication Date: 1/17/2025

Reference Information

CVE: CVE-2024-10497

CWE: 639

ICSA: 25-028-02