Multiple vulnerabilities in Schneider Electric APC Easy UPS Online and Easy UPS Online



Published: 2023-04-17 | Updated: 2023-04-26
Risk High
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2023-29413
CVE-2023-29411
CVE-2023-29412
CWE-ID CWE-306
CWE-78
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
APC Easy UPS Online
Other software / Other software solutions

Easy UPS Online
Other software / Other software solutions

Vendor Schneider Electric

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Missing Authentication for Critical Function

EUVDB-ID: #VU75148

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-29413

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to missing authentication for critical function within the SocketService module. A remote attacker can bypass authentication process and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APC Easy UPS Online: 2.5-GA-01-22320

Easy UPS Online: 2.5-GS-01-22320

External links

http://www.zerodayinitiative.com/advisories/ZDI-23-443/
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Missing Authentication for Critical Function

EUVDB-ID: #VU75149

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-29411

CWE-ID: CWE-306 - Missing Authentication for Critical Function

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass authentication process.

The vulnerability exists due to missing authentication for critical function within the updateManagerPassword function. A remote attacker can gain administrative credentials and execute arbitrary code on the target system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APC Easy UPS Online: 2.5-GA-01-22320

Easy UPS Online: 2.5-GS-01-22320

External links

http://www.zerodayinitiative.com/advisories/ZDI-23-444/
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) OS Command Injection

EUVDB-ID: #VU75150

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2023-29412

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation within the getMacAddressByIP function. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

APC Easy UPS Online: 2.5-GA-01-22320

Easy UPS Online: 2.5-GS-01-22320

External links

http://www.zerodayinitiative.com/advisories/ZDI-23-445/
http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf
http://www.tenable.com/security/research/tra-2023-15


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###