First published: Wed Feb 01 2023(Updated: )
A CWE-306: Missing Authentication for Critical Function The software does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. Affected Products: APC Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GA), APC Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GA-01-22261), Schneider Electric Easy UPS Online Monitoring Software (Windows 7, 10, 11 & Windows Server 2016, 2019, 2022 - Versions prior to V2.5-GS), Schneider Electric Easy UPS Online Monitoring Software (Windows 11, Windows Server 2019, 2022 - Versions prior to V2.5-GS-01-22261)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Apc Easy Ups Online Monitoring Software | <2.5-ga-01-22320 | |
Microsoft Windows 11 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows Server 2022 | ||
Schneider-electric Easy Ups Online Monitoring Software | <2.5-gs-01-22320 | |
Schneider-electric Apc Easy Ups Online Monitoring Software | <2.5-ga | |
Microsoft Windows 10 | ||
Microsoft Windows 7 | ||
Microsoft Windows Server 2016 | ||
Schneider-electric Easy Ups Online Monitoring Software | <2.5-gs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-42970 is a vulnerability that allows attackers to perform critical functions without authentication in the APC Easy UPS Online Monitoring Software.
The APC Easy UPS Online Monitoring Software versions up to exclusive 2.5-ga-01-22320 and up to exclusive 2.5-gs-01-22320 are affected by CVE-2022-42970.
The severity of CVE-2022-42970 is critical with a CVSS score of 9.8.
To fix CVE-2022-42970, it is recommended to apply the necessary patches or updates provided by Schneider Electric.
You can find more information about CVE-2022-42970 in the security notification available at the provided reference link.