CVE-2021-22783

8.8 HIGH

📋 TL;DR

This vulnerability allows session hijacking through information exposure when the Ritto Wiser Door panel communicates with the door. Attackers could intercept sensitive session data to gain unauthorized access. All versions of Ritto Wiser Door products are affected.

💻 Affected Systems

Products:
  • Ritto Wiser Door
Versions: All versions
Operating Systems: Embedded systems in door hardware
Default Config Vulnerable: ⚠️ Yes
Notes: All installations are vulnerable by default as this is a protocol-level vulnerability in the door communication system.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete physical access compromise allowing attackers to unlock doors remotely, bypass security systems, and gain entry to secured areas.

🟠

Likely Case

Unauthorized door control leading to security breaches, theft, or unauthorized building access.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but still potential for localized security breaches.

🌐 Internet-Facing: HIGH if door systems are exposed to internet, as attackers could remotely hijack sessions from anywhere.
🏢 Internal Only: MEDIUM as attackers would need internal network access, but once inside could compromise multiple doors.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires network access to intercept door communication traffic, but no authentication is needed once traffic is captured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Schneider Electric for specific firmware updates

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-067-03

Restart Required: Yes

Instructions:

1. Contact Schneider Electric support for firmware updates. 2. Schedule maintenance window. 3. Apply firmware update to all affected door systems. 4. Verify communication encryption is enabled.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate door communication networks from general corporate networks

Physical Access Controls

all

Implement additional physical security measures as compensating controls

🧯 If You Can't Patch

  • Segment door communication networks completely from other systems
  • Implement strict network monitoring for unusual door communication patterns

🔍 How to Verify

Check if Vulnerable:

Check if Ritto Wiser Door systems are installed and communicating without encryption

Check Version:

Check door panel interface or contact Schneider Electric for version verification

Verify Fix Applied:

Verify firmware version with Schneider Electric and confirm communication is encrypted

📡 Detection & Monitoring

Log Indicators:

  • Unusual door access patterns
  • Multiple failed authentication attempts on door systems

Network Indicators:

  • Unencrypted door communication traffic
  • Suspicious network traffic to door controllers

SIEM Query:

source="door_systems" AND (protocol="unencrypted" OR event_type="unauthorized_access")

🔗 References

📤 Share & Export