First published: Fri Jan 28 2022(Updated: )
A CVE-352 Cross-Site Request Forgery (CSRF) vulnerability exists that could allow an attacker to impersonate the user or carry out actions on their behalf when crafted malicious parameters are submitted in POST requests sent to the charging station web server. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Evlink City Evc1s22p4 Firmware | <3.4.0.2 | |
Schneider-electric Evc1s22p4 Firmware | ||
Schneider Electric Evlink City EVC1S7P4 | <3.4.0.2 | |
Schneider-electric Evlink City Evc1s7p4 Firmware | ||
Schneider Electric Evw2 | <3.4.0.2 | |
Schneider Electric Evw2 | ||
Schneider Electric EVF2 | <3.4.0.2 | |
Schneider Electric EVF2 | ||
Schneider Electric EVP2PE Firmware | <3.4.0.2 | |
Schneider-electric Evp2pe Firmware | ||
Schneider Electric EVB1A | <3.4.0.2 | |
Schneider-electric Evlink Smart Wallbox Evb1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22724 is considered a medium severity Cross-Site Request Forgery (CSRF) vulnerability.
To fix CVE-2021-22724, update the affected firmware of your Schneider Electric devices to the latest version that addresses this vulnerability.
CVE-2021-22724 affects several Schneider Electric products including the EVlink City EVC1S22P and others listed in the advisory.
CVE-2021-22724 allows an attacker to perform Cross-Site Request Forgery attacks, potentially impersonating users.
Yes, CVE-2021-22724 can be exploited remotely if crafted malicious parameters are submitted via POST requests.