CVE-2021-22783
📋 TL;DR
This vulnerability allows session hijacking through information exposure when the Ritto Wiser Door panel communicates with the door. Attackers could intercept sensitive session data to gain unauthorized access. All versions of Ritto Wiser Door products are affected.
💻 Affected Systems
- Ritto Wiser Door
📦 What is this software?
Ritto Wiser Door by Schneider Electric
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete physical access compromise allowing attackers to unlock doors remotely, bypass security systems, and gain entry to secured areas.
Likely Case
Unauthorized door control leading to security breaches, theft, or unauthorized building access.
If Mitigated
Limited impact with proper network segmentation and monitoring, but still potential for localized security breaches.
🎯 Exploit Status
Exploitation requires network access to intercept door communication traffic, but no authentication is needed once traffic is captured.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Contact Schneider Electric for specific firmware updates
Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-03
Restart Required: Yes
Instructions:
1. Contact Schneider Electric support for firmware updates. 2. Schedule maintenance window. 3. Apply firmware update to all affected door systems. 4. Verify communication encryption is enabled.
🔧 Temporary Workarounds
Network Segmentation
allIsolate door communication networks from general corporate networks
Physical Access Controls
allImplement additional physical security measures as compensating controls
🧯 If You Can't Patch
- Segment door communication networks completely from other systems
- Implement strict network monitoring for unusual door communication patterns
🔍 How to Verify
Check if Vulnerable:
Check if Ritto Wiser Door systems are installed and communicating without encryption
Check Version:
Check door panel interface or contact Schneider Electric for version verification
Verify Fix Applied:
Verify firmware version with Schneider Electric and confirm communication is encrypted
📡 Detection & Monitoring
Log Indicators:
- Unusual door access patterns
- Multiple failed authentication attempts on door systems
Network Indicators:
- Unencrypted door communication traffic
- Suspicious network traffic to door controllers
SIEM Query:
source="door_systems" AND (protocol="unencrypted" OR event_type="unauthorized_access")