CVE-2021-22763

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass password recovery mechanisms in Schneider Electric PowerLogic devices, potentially gaining administrator-level access. It affects PowerLogic PM55xx, PM8ECC, EGX100, and EGX300 devices with weak password recovery implementations.

💻 Affected Systems

Products:
  • PowerLogic PM55xx
  • PowerLogic PM8ECC
  • PowerLogic EGX100
  • PowerLogic EGX300
Versions: Specific versions not detailed in CVE; refer to Schneider Electric security notifications for affected versions.
Operating Systems: Embedded/device-specific OS
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected products are vulnerable unless patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise with administrator privileges, allowing attackers to manipulate power monitoring data, disrupt operations, or use devices as network footholds.

🟠

Likely Case

Unauthorized administrative access leading to data manipulation, configuration changes, or disruption of power monitoring functions.

🟢

If Mitigated

Limited impact if devices are isolated from untrusted networks and have additional authentication layers.

🌐 Internet-Facing: HIGH - Internet-exposed devices are directly vulnerable to remote exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation likely involves manipulating password recovery requests; no public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Schneider Electric security notifications SEVD-2021-159-02 and SEVD-2021-159-03 for specific patched versions.

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-159-02

Restart Required: Yes

Instructions:

1. Download firmware update from Schneider Electric portal. 2. Apply update following vendor instructions. 3. Restart device to activate patch.

🔧 Temporary Workarounds

Network Isolation

all

Isolate affected devices from untrusted networks and internet access.

Access Control Lists

all

Implement strict network ACLs to limit device access to authorized management systems only.

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices
  • Enable additional authentication mechanisms and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against Schneider Electric security notifications.

Check Version:

Device-specific command via web interface or CLI; consult product documentation.

Verify Fix Applied:

Verify firmware version matches patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed password recovery attempts
  • Unusual administrative login patterns
  • Configuration changes from unexpected sources

Network Indicators:

  • Unusual traffic to password recovery endpoints
  • Administrative access from unauthorized IP addresses

SIEM Query:

source="powerlogic-device" AND (event_type="password_recovery" OR event_type="admin_login")

🔗 References

📤 Share & Export