CVE-2018-7245

9.1 CRITICAL

📋 TL;DR

An improper authorization vulnerability in Schneider Electric's 66074 MGE Network Management Card allows remote attackers to change UPS control, shutdown parameters, and other critical settings without authentication. This affects MGE UPS and MGE STS devices with the vulnerable network management card installed. Attackers can potentially cause power disruptions or modify critical infrastructure settings.

💻 Affected Systems

Products:
  • Schneider Electric 66074 MGE Network Management Card
  • MGE UPS systems with affected card
  • MGE STS systems with affected card
Versions: All versions prior to firmware version 2.2.2
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web interface enabled (default). Physical access not required - exploitation is network-based.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote attacker could shut down UPS systems causing complete power loss to connected equipment, modify settings to damage equipment, or disrupt critical infrastructure operations.

🟠

Likely Case

Unauthorized changes to UPS parameters leading to unexpected shutdowns, equipment damage, or service disruptions in affected environments.

🟢

If Mitigated

With proper network segmentation and access controls, impact limited to authorized management networks only.

🌐 Internet-Facing: HIGH - Web interface is exposed on ports 80/443 and vulnerable to unauthenticated attacks if accessible from internet.
🏢 Internal Only: HIGH - Even internally, any network-accessible device can be exploited without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability allows direct access to administrative functions without authentication. Exploitation requires only network access to web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 2.2.2

Vendor Advisory: https://www.schneider-electric.com/en/download/document/SEVD-2018-074-01/

Restart Required: Yes

Instructions:

1. Download firmware version 2.2.2 from Schneider Electric website. 2. Access device web interface. 3. Navigate to firmware update section. 4. Upload and apply new firmware. 5. Device will restart automatically.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected devices on separate VLAN with strict firewall rules limiting access to management networks only.

Disable Web Interface

all

If web management not required, disable HTTP/HTTPS services on the network management card.

🧯 If You Can't Patch

  • Implement strict network access controls - only allow management from specific IP addresses
  • Monitor network traffic to affected devices for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SNMP. If version is below 2.2.2, device is vulnerable.

Check Version:

Access web interface at http://[device-ip]/ and check firmware version in system information page

Verify Fix Applied:

Confirm firmware version shows 2.2.2 or higher after update. Test that unauthorized access to administrative functions is blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to administrative URLs
  • Configuration changes from unexpected IP addresses
  • Multiple failed login attempts followed by successful configuration changes

Network Indicators:

  • HTTP/HTTPS traffic to administrative endpoints from unauthorized sources
  • POST requests to configuration endpoints without prior authentication

SIEM Query:

source_ip NOT IN (authorized_management_ips) AND (url CONTAINS "/config/" OR url CONTAINS "/admin/") AND dest_port IN (80,443)

🔗 References

📤 Share & Export