Schneider Electric EVlink City EVC1S22P4 prior 3.4.0.2 POST Request cross-site request forgery
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.1 | $0-$5k | 0.00 |
A vulnerability was found in Schneider Electric EVlink City EVC1S22P4, EVlink City EVC1S7P4, EVlink Parking EVW2, EVlink Parking EVF2, EVlink Parking EVP2PE and EVlink Smart Wallbox EVB1A (SCADA Software). It has been rated as problematic. Affected by this issue is an unknown code of the component POST Request Handler. The manipulation with an unknown input leads to a cross-site request forgery vulnerability. Using CWE to declare the problem leads to CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Impacted is integrity.
The weakness was presented 01/29/2022 as SEVD-2021-348-02. The advisory is shared for download at download.schneider-electric.com. This vulnerability is handled as CVE-2021-22724 since 01/06/2021. Successful exploitation requires user interaction by the victim. There are neither technical details nor an exploit publicly available.
Upgrading to version 3.4.0.2 eliminates this vulnerability.
Product
Type
Vendor
Name
- EVlink City EVC1S7P4
- EVlink City EVC1S22P4
- EVlink Parking EVF2
- EVlink Parking EVP2PE
- EVlink Parking EVW2
- EVlink Smart Wallbox EVB1A
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.1
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Cross-site request forgeryCWE: CWE-352 / CWE-862 / CWE-863
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: EVlink City EVC1S22P4/EVlink City EVC1S7P4/EVlink Parking EVW2/EVlink Parking EVF2/EVlink Parking EVP2PE/EVlink Smart Wallbox EVB1A 3.4.0.2
Timeline
01/06/2021 🔍01/29/2022 🔍
01/29/2022 🔍
02/02/2022 🔍
Sources
Vendor: schneider-electric.comAdvisory: SEVD-2021-348-02
Status: Confirmed
CVE: CVE-2021-22724 (🔍)
Entry
Created: 01/29/2022 08:32Updated: 02/02/2022 07:57
Changes: 01/29/2022 08:32 (40), 02/02/2022 07:57 (1)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.