CVE-2021-22820
📋 TL;DR
This vulnerability allows attackers to maintain unauthorized access to EV charger web servers even after legitimate users change their passwords. Attackers can hijack active sessions and continue accessing the system. Affected products include Schneider Electric EVlink City, Parking, and Smart Wallbox chargers.
💻 Affected Systems
- EVlink City EVC1S22P4
- EVlink City EVC1S7P4
- EVlink Parking EVW2
- EVlink Parking EVF2
- EVlink Parking EVP2PE
- EVlink Smart Wallbox EVB1A
📦 What is this software?
Evlink City Evc1s22p4 Firmware by Schneider Electric
Evlink City Evc1s7p4 Firmware by Schneider Electric
Evlink Parking Evf2 Firmware by Schneider Electric
Evlink Parking Evp2pe Firmware by Schneider Electric
Evlink Parking Evw2 Firmware by Schneider Electric
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain persistent administrative access to EV charging infrastructure, potentially enabling manipulation of charging operations, data theft, or disruption of charging services.
Likely Case
Unauthorized access to charger management interfaces allowing configuration changes, user data viewing, or service disruption.
If Mitigated
Limited impact with proper network segmentation and monitoring, though session hijacking remains possible.
🎯 Exploit Status
Requires session hijacking capability but session management flaws make exploitation straightforward
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: R8 V3.4.0.2
Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02
Restart Required: Yes
Instructions:
1. Download firmware R8 V3.4.0.2 from Schneider Electric portal. 2. Upload firmware to affected EV charger via management interface. 3. Apply firmware update. 4. Reboot charger to complete installation.
🔧 Temporary Workarounds
Network segmentation
allIsolate EV charger management interfaces from untrusted networks
Session timeout reduction
allConfigure shorter session timeout values if available in management interface
🧯 If You Can't Patch
- Implement strict network access controls to limit charger web interface access
- Monitor for unusual session activity and implement regular password rotation
🔍 How to Verify
Check if Vulnerable:
Check firmware version in charger web interface. If version is prior to R8 V3.4.0.2, system is vulnerable.
Check Version:
Access charger web interface and navigate to System Information or Firmware Status page
Verify Fix Applied:
Confirm firmware version shows R8 V3.4.0.2 or later in management interface.
📡 Detection & Monitoring
Log Indicators:
- Multiple active sessions from same user
- Session activity continuing after password change
- Unusual access patterns to management interface
Network Indicators:
- Unexpected traffic to charger web ports (typically 80/443)
- Session cookies being reused across different IP addresses
SIEM Query:
source="ev_charger_logs" AND (event="session_created" OR event="password_change") | stats count by user, session_id