CVE-2018-7245
📋 TL;DR
An improper authorization vulnerability in Schneider Electric's 66074 MGE Network Management Card allows remote attackers to change UPS control, shutdown parameters, and other critical settings without authentication. This affects MGE UPS and MGE STS devices with the vulnerable network management card installed. Attackers can potentially cause power disruptions or modify critical infrastructure settings.
💻 Affected Systems
- Schneider Electric 66074 MGE Network Management Card
- MGE UPS systems with affected card
- MGE STS systems with affected card
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote attacker could shut down UPS systems causing complete power loss to connected equipment, modify settings to damage equipment, or disrupt critical infrastructure operations.
Likely Case
Unauthorized changes to UPS parameters leading to unexpected shutdowns, equipment damage, or service disruptions in affected environments.
If Mitigated
With proper network segmentation and access controls, impact limited to authorized management networks only.
🎯 Exploit Status
Vulnerability allows direct access to administrative functions without authentication. Exploitation requires only network access to web interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware version 2.2.2
Vendor Advisory: https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/
Restart Required: Yes
Instructions:
1. Download firmware version 2.2.2 from Schneider Electric website. 2. Access device web interface. 3. Navigate to firmware update section. 4. Upload and apply new firmware. 5. Device will restart automatically.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices on separate VLAN with strict firewall rules limiting access to management networks only.
Disable Web Interface
allIf web management not required, disable HTTP/HTTPS services on the network management card.
🧯 If You Can't Patch
- Implement strict network access controls - only allow management from specific IP addresses
- Monitor network traffic to affected devices for unauthorized access attempts
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface or SNMP. If version is below 2.2.2, device is vulnerable.
Check Version:
Access web interface at http://[device-ip]/ and check firmware version in system information page
Verify Fix Applied:
Confirm firmware version shows 2.2.2 or higher after update. Test that unauthorized access to administrative functions is blocked.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to administrative URLs
- Configuration changes from unexpected IP addresses
- Multiple failed login attempts followed by successful configuration changes
Network Indicators:
- HTTP/HTTPS traffic to administrative endpoints from unauthorized sources
- POST requests to configuration endpoints without prior authentication
SIEM Query:
source_ip NOT IN (authorized_management_ips) AND (url CONTAINS "/config/" OR url CONTAINS "/admin/") AND dest_port IN (80,443)