Skip to main content

CVE-2024-2637: CWE-427 Uncontrolled Search Path Element in B&R Industrial Automation Scene Viewer

Medium
Published: Tue May 14 2024 (05/14/2024, 18:49:28 UTC)
Source: CVE
Vendor/Project: B&R Industrial Automation
Product: Scene Viewer

Description

An Uncontrolled Search Path Element vulnerability in B&R Industrial Automation Scene Viewer, B&R Industrial Automation Automation Runtime, B&R Industrial Automation mapp Vision, B&R Industrial Automation mapp View, B&R Industrial Automation mapp Cockpit, B&R Industrial Automation mapp Safety, B&R Industrial Automation VC4, B&R Industrial Automation APROL, B&R Industrial Automation CAN Driver, B&R Industrial Automation CAN Driver CC770, B&R Industrial Automation CAN Driver SJA1000, B&R Industrial Automation Tou0ch Lock, B&R Industrial Automation B&R Single-Touch Driver, B&R Industrial Automation Serial User Mode Touch Driver, B&R Industrial Automation Windows Settings Changer (LTSC), B&R Industrial Automation Windows Settings Changer (2019 LTSC), B&R Industrial Automation Windows 10 Recovery Solution, B&R Industrial Automation ADI driver universal, B&R Industrial Automation ADI Development Kit, B&R Industrial Automation ADI .NET SDK, B&R Industrial Automation SRAM driver, B&R Industrial Automation HMI Service Center, B&R Industrial Automation HMI Service Center Maintenance, B&R Industrial Automation Windows 10 IoT Enterprise 2019 LTSC, B&R Industrial Automation KCF Editor could allow an authenticated local attacker to execute malicious code by placing specially crafted files in the loading search path..This issue affects Scene Viewer: before 4.4.0; Automation Runtime: before J4.93; mapp Vision: before 5.26.1; mapp View: before 5.24.2; mapp Cockpit: before 5.24.2; mapp Safety: before 5.24.2; VC4: before 4.73.2; APROL: before 4.4-01; CAN Driver: before 1.1.0; CAN Driver CC770: before 3.3.0; CAN Driver SJA1000: before 1.3.0; Tou0ch Lock: before 2.1.0; B&R Single-Touch Driver: before 2.0.0; Serial User Mode Touch Driver: before 1.7.1; Windows Settings Changer (LTSC): before 3.2.0; Windows Settings Changer (2019 LTSC): before 2.2.0; Windows 10 Recovery Solution: before 3.2.0; ADI driver universal: before 3.2.0; ADI Development Kit: before 5.5.0; ADI .NET SDK: before 4.1.0; SRAM driver: before 1.2.0; HMI Service Center: before 3.1.0; HMI Service Center Maintenance: before 2.1.0; Windows 10 IoT Enterprise 2019 LTSC: through 1.1; KCF Editor: before 1.1.0.

AI-Powered Analysis

AILast updated: 06/24/2025, 02:40:38 UTC

Technical Analysis

CVE-2024-2637 is an Uncontrolled Search Path Element vulnerability (CWE-427) affecting multiple products from B&R Industrial Automation, including Scene Viewer, Automation Runtime, mapp Vision, mapp View, mapp Cockpit, mapp Safety, VC4, APROL, various CAN Drivers, Touch Lock, Single-Touch Driver, Serial User Mode Touch Driver, Windows Settings Changer variants, Windows 10 Recovery Solution, ADI drivers and SDKs, SRAM driver, HMI Service Center and Maintenance, Windows 10 IoT Enterprise 2019 LTSC, and KCF Editor. The vulnerability arises because these products improperly handle the search path used to locate executable files or libraries, allowing an authenticated local attacker to place specially crafted files in the search path. When the affected software loads resources or executables, it may inadvertently execute malicious code from these attacker-controlled locations. This can lead to local code execution with the privileges of the affected application. The vulnerability affects versions prior to specified fixed releases (e.g., Scene Viewer before 4.4.0, Automation Runtime before J4.93, etc.). Exploitation requires local authentication, meaning the attacker must have valid access to the system. There is no indication that user interaction beyond authentication is needed. No known exploits are currently reported in the wild. The vulnerability impacts the confidentiality, integrity, and availability of the affected systems by enabling unauthorized code execution, potentially allowing attackers to manipulate industrial automation processes or disrupt operations. Given the broad range of affected products used in industrial control and automation environments, this vulnerability poses a significant risk to operational technology (OT) environments relying on B&R Industrial Automation solutions.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability could have serious consequences. Successful exploitation could allow an authenticated insider or a compromised local user to execute arbitrary code, potentially leading to sabotage, data manipulation, or disruption of industrial processes. This could result in production downtime, safety hazards, financial losses, and damage to reputation. Given the integration of B&R Industrial Automation products in sectors such as automotive manufacturing, energy, and utilities across Europe, the vulnerability could impact operational continuity and safety. Furthermore, the ability to execute code locally could be leveraged as a foothold for lateral movement within industrial networks, increasing the risk of broader compromise. The medium severity rating reflects the requirement for local authentication, but the critical nature of industrial control systems elevates the potential impact. Organizations with remote access solutions or weak local access controls may face increased risk. The lack of known exploits in the wild suggests limited immediate threat but does not diminish the urgency of remediation due to the potential for high-impact attacks in sensitive environments.

Mitigation Recommendations

1. Immediate application of vendor patches and updates to all affected B&R Industrial Automation products is the most effective mitigation. Organizations should prioritize upgrading to fixed versions as listed in the advisory. 2. Restrict and monitor local access to systems running affected software. Implement strict access controls, including multi-factor authentication for local logins where possible, to reduce risk of unauthorized local access. 3. Employ application whitelisting and integrity monitoring on industrial control systems to detect and prevent execution of unauthorized or malicious binaries placed in search paths. 4. Review and harden system configurations to limit writable directories in the search path, ensuring that only trusted locations are used for executable loading. 5. Conduct regular audits of installed software versions and patch status across OT environments to identify and remediate vulnerable instances promptly. 6. Segment industrial networks to limit lateral movement opportunities if local compromise occurs. 7. Implement robust logging and alerting for suspicious file creation or modification in directories involved in executable loading paths. 8. Educate and train local users and administrators on the risks of placing unauthorized files in system paths and the importance of following security policies. These measures, combined with patching, will reduce the attack surface and mitigate exploitation risk beyond generic advice.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
ABB
Date Reserved
2024-03-19T08:15:24.368Z
Cisa Enriched
true

Threat ID: 682d9840c4522896dcbf15e2

Added to database: 5/21/2025, 9:09:20 AM

Last enriched: 6/24/2025, 2:40:38 AM

Last updated: 8/12/2025, 9:03:26 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats