First published: Fri Jan 28 2022(Updated: )
A CVE-352 Cross-Site Request Forgery (CSRF) vulnerability exists that could allow an attacker to impersonate the user or carry out actions on their behalf when crafted malicious parameters are submitted in POST requests sent to the charging station web server. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Evc1s22p4 Firmware | <3.4.0.2 | |
Schneider-electric Evc1s22p4 | ||
Schneider-electric Evc1s7p4 Firmware | <3.4.0.2 | |
Schneider-electric Evc1s7p4 | ||
Schneider-electric Evw2 Firmware | <3.4.0.2 | |
Schneider-electric Evw2 | ||
Schneider-electric Evf2 Firmware | <3.4.0.2 | |
Schneider-electric Evf2 | ||
Schneider-electric Evp2pe Firmware | <3.4.0.2 | |
Schneider-electric Evp2pe | ||
Schneider-electric Evb1a Firmware | <3.4.0.2 | |
Schneider-electric Evb1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22724 is considered a medium severity Cross-Site Request Forgery (CSRF) vulnerability.
To fix CVE-2021-22724, update the affected firmware of your Schneider Electric devices to the latest version that addresses this vulnerability.
CVE-2021-22724 affects several Schneider Electric products including the EVlink City EVC1S22P and others listed in the advisory.
CVE-2021-22724 allows an attacker to perform Cross-Site Request Forgery attacks, potentially impersonating users.
Yes, CVE-2021-22724 can be exploited remotely if crafted malicious parameters are submitted via POST requests.