First published: Fri Jan 28 2022(Updated: )
A CWE-614 Insufficient Session Expiration vulnerability exists that could allow an attacker to maintain an unauthorized access over a hijacked session to the charger station web server even after the legitimate user account holder has changed his password. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Evlink City Evc1s22p4 Firmware | <3.4.0.2 | |
Schneider-electric Evlink City Evc1s22p4 | ||
Schneider-electric Evlink City Evc1s7p4 Firmware | <3.4.0.2 | |
Schneider-electric Evlink City Evc1s7p4 | ||
Schneider-electric Evlink Parking Evw2 Firmware | <3.4.0.2 | |
Schneider-electric Evlink Parking Evw2 | ||
Schneider-electric Evlink Parking Evf2 Firmware | <3.4.0.2 | |
Schneider-electric Evlink Parking Evf2 | ||
Schneider-electric Evlink Parking Evp2pe Firmware | <3.4.0.2 | |
Schneider-electric Evlink Parking Evp2pe | ||
Schneider-electric Evlink Smart Wallbox Evb1a Firmware | <3.4.0.2 | |
Schneider-electric Evlink Smart Wallbox Evb1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-22820.
CVE-2021-22820 has a severity rating of 9.8 (critical).
The affected software includes Schneider-electric Evlink City EVC1S22P4 Firmware up to version 3.4.0.2.
This vulnerability allows an attacker to maintain an unauthorized access over a hijacked session to the charger station web server even after the legitimate user account holder has changed their password.
To fix CVE-2021-22820, it is recommended to update the Schneider-electric Evlink City EVC1S22P4 Firmware to a version beyond 3.4.0.2.