CVE-2021-22707

9.8 CRITICAL

📋 TL;DR

This vulnerability involves hard-coded administrative credentials in Schneider Electric EVlink charging stations, allowing attackers to issue unauthorized commands with full administrative privileges. Affected systems include EVlink City, EVlink Parking, and EVlink Smart Wallbox charging stations running versions prior to R8 V3.4.0.1.

💻 Affected Systems

Products:
  • EVlink City (EVC1S22P4 / EVC1S7P4)
  • EVlink Parking (EVW2 / EVF2 / EV.2)
  • EVlink Smart Wallbox (EVB1A)
Versions: All versions prior to R8 V3.4.0.1
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products are vulnerable in their default configurations due to hard-coded credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of charging station functionality, enabling attackers to disable charging, manipulate billing, cause physical damage through electrical manipulation, or use the station as an entry point into connected networks.

🟠

Likely Case

Unauthorized administrative access allowing attackers to disrupt charging operations, steal electricity, or gather sensitive user data from the charging station.

🟢

If Mitigated

Limited impact if stations are isolated on separate networks with strict firewall rules and network segmentation preventing external access.

🌐 Internet-Facing: HIGH - Charging stations are often deployed in public locations with internet connectivity, making them directly accessible to attackers.
🏢 Internal Only: MEDIUM - Even internally, attackers with network access could exploit this to compromise charging infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of the hard-coded credentials and network access to the charging station's web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R8 V3.4.0.1

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06

Restart Required: Yes

Instructions:

1. Download firmware version R8 V3.4.0.1 from Schneider Electric's website. 2. Follow the vendor's firmware update procedure for your specific EVlink model. 3. Verify the update completed successfully. 4. Change any default passwords after updating.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate charging stations on separate VLANs with strict firewall rules preventing external access to the web interface.

Access Control Lists

all

Implement IP-based access control to restrict web interface access to authorized management systems only.

🧯 If You Can't Patch

  • Segment charging stations on isolated networks with no internet access
  • Implement strict firewall rules blocking all external access to charging station management interfaces

🔍 How to Verify

Check if Vulnerable:

Check firmware version via the charging station's web interface or management console. If version is earlier than R8 V3.4.0.1, the system is vulnerable.

Check Version:

Access the charging station's web interface and navigate to System Information or Firmware Status page.

Verify Fix Applied:

Confirm firmware version is R8 V3.4.0.1 or later via the web interface or management console.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful login with default credentials
  • Unauthorized configuration changes
  • Unusual administrative activity outside normal hours

Network Indicators:

  • External IP addresses accessing charging station web interfaces
  • Traffic to charging station management ports from unauthorized sources

SIEM Query:

source_ip IN (external_ips) AND dest_port=80 AND (user_agent CONTAINS 'admin' OR uri_path CONTAINS 'login') AND status_code=200

🔗 References

📤 Share & Export