CVE-2021-22774

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to recover user account credentials from Schneider Electric EVlink charging stations through dictionary attacks. The affected systems store passwords using unsalted one-way hashes, making them vulnerable to offline cracking. All EVlink City, EVlink Parking, and EVlink Smart Wallbox devices running versions prior to R8 V3.4.0.1 are impacted.

💻 Affected Systems

Products:
  • EVlink City (EVC1S22P4)
  • EVlink City (EVC1S7P4)
  • EVlink Parking (EVW2)
  • EVlink Parking (EVF2)
  • EVlink Parking (EV.2)
  • EVlink Smart Wallbox (EVB1A)
Versions: All versions prior to R8 V3.4.0.1
Operating Systems: Embedded systems
Default Config Vulnerable: ⚠️ Yes
Notes: All affected products use the same vulnerable authentication mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to charging stations, potentially disrupting charging services, manipulating billing data, or accessing connected networks.

🟠

Likely Case

Attackers compromise user accounts to access charging services without payment or gather credential data for further attacks.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to credential exposure without broader system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to password hashes, which may be obtained through other vulnerabilities or physical access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: R8 V3.4.0.1

Vendor Advisory: http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06

Restart Required: Yes

Instructions:

1. Download firmware version R8 V3.4.0.1 from Schneider Electric portal. 2. Follow manufacturer's firmware update procedure for your specific EVlink model. 3. Verify successful update and restart device.

🔧 Temporary Workarounds

Network segmentation

all

Isolate charging stations from critical networks and limit access to management interfaces.

Strong password policy

all

Enforce complex, unique passwords for all user accounts to reduce dictionary attack effectiveness.

🧯 If You Can't Patch

  • Implement network access controls to restrict management interface access to authorized IPs only.
  • Monitor authentication logs for failed login attempts and implement account lockout policies.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or management console. If version is earlier than R8 V3.4.0.1, device is vulnerable.

Check Version:

Check via web interface: Login to device management portal and navigate to System Information or About page.

Verify Fix Applied:

Confirm firmware version shows R8 V3.4.0.1 or later in device management interface.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts from single source
  • Successful logins from unusual locations or times

Network Indicators:

  • Unusual traffic patterns to charging station management ports
  • Brute-force attack patterns against authentication endpoints

SIEM Query:

source="evlink" AND (event_type="auth_failure" AND count > 10 within 5min) OR (event_type="auth_success" AND user="admin" AND src_ip NOT IN allowed_ips)

🔗 References

📤 Share & Export