CVE-2022-0715:
APC Smart-UPS and SmartConnect devices from Schneider Electric are affected by CWE-287 Improper Authentication, which could allow an attacker with a leaked key to upload malicious firmware and arbitrarily change UPS behavior across multiple SMT/SMC/SCL/SMX/SRT and related SmartConnect variants.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.1Critical- Published Date:Mar 9, 2022
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:1.1
- EPSS Percentile:78%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.2
- Confidentiality Impact:NONE
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
APC Smart-UPS and SmartConnect devices from Schneider Electric are affected by CWE-287 Improper Authentication, which could allow an attacker with a leaked key to upload malicious firmware and arbitrarily change UPS behavior across multiple SMT/SMC/SCL/SMX/SRT and related SmartConnect variants.
Overview
Schneider Electric reports an improper authentication vulnerability (CWE-287) affecting APC Smart-UPS and SmartConnect devices across multiple series. A leaked key could enable an attacker to upload malicious firmware and arbitrarily modify UPS behavior, placing devices at risk of compromise. The affected families include SMT, SMC, SCL, SMX, SRT, and corresponding SmartConnect variants, with detailed version and ID references provided in the advisory SEVD-2022-067-02.
Remediation
- Update to Schneider Electric’s advised firmware version that addresses CVE-2022-0715 (per SEVD-2022-067-02). Verify and apply the patch from Schneider Electric for your specific model/series.
- Rotate or revoke any leaked/authentication keys and enforce robust key management; implement strict access controls to prevent reuse of compromised credentials.
- Enforce strong authentication for management interfaces; disable or restrict remote management access to trusted networks and known IPs.
- Ensure firmware updates are authenticated and verified (enable and require firmware signing/verification for all uploads).
- Implement network segmentation and restrict access to UPS management interfaces; disable unnecessary services or protocols that could be abused to upload firmware.
- Monitor and alert on anomalous management activity and firmware upload attempts; review logs for unauthorized configuration or firmware updates.
- If a fixed patch is not available for your model, apply mitigations such as limiting access to management interfaces, isolating UPS devices on secured networks, and consulting Schneider Electric support for recommended interim steps.
References
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.