CVE-2021-20643
📋 TL;DR
CVE-2021-20643 is an improper access control vulnerability in ELECOM LD-PS/U1 power strip management devices that allows remote attackers to change the administrative password without authentication. This affects organizations using these network-connected power strips for remote power management. Attackers can gain administrative control over the device.
💻 Affected Systems
- ELECOM LD-PS/U1
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of power strip management allowing attackers to remotely power cycle connected equipment, potentially causing service disruption or equipment damage.
Likely Case
Unauthorized administrative access leading to power manipulation of connected servers or network equipment, causing service interruptions.
If Mitigated
No impact if device is not internet-facing and network segmentation prevents access from untrusted networks.
🎯 Exploit Status
Simple HTTP request manipulation required. Technical details and proof-of-concept available in public advisories.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware update from vendor
Vendor Advisory: https://www.elecom.co.jp/news/security/20210126-01/
Restart Required: Yes
Instructions:
1. Download latest firmware from ELECOM support site. 2. Access device web interface. 3. Navigate to firmware update section. 4. Upload and apply firmware. 5. Reboot device.
🔧 Temporary Workarounds
Network Segmentation
allIsolate LD-PS/U1 devices on separate VLAN with strict firewall rules
Access Control Lists
allImplement IP-based restrictions to allow only trusted management stations
🧯 If You Can't Patch
- Remove from internet-facing networks immediately
- Implement strict network segmentation and firewall rules to limit access to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check firmware version via web interface. If not updated to latest version, device is vulnerable.
Check Version:
Access device web interface and check firmware version in system information
Verify Fix Applied:
Verify firmware version shows latest patched version and test that password change requires proper authentication.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized password change attempts
- Multiple failed login attempts followed by successful password change
Network Indicators:
- HTTP POST requests to password change endpoints from untrusted sources
- Unusual network traffic to power strip management port
SIEM Query:
source_ip NOT IN trusted_management_ips AND dest_port=80 AND uri_contains='password' AND method='POST'