CVE-2022-22807

7.4 HIGH

📋 TL;DR

This clickjacking vulnerability allows attackers to trick users into performing unintended actions on the EcoStruxure EV Charging Expert web interface by overlaying malicious content in iframes. Attackers could modify product settings or user accounts without proper user consent. All versions prior to SP8 (Version 01) V4.0.0.13 are affected.

💻 Affected Systems

Products:
  • EcoStruxure EV Charging Expert (formerly EVlink Load Management System)
Versions: All versions prior to SP8 (Version 01) V4.0.0.13
Operating Systems: Embedded system specific to Schneider Electric charging infrastructure
Default Config Vulnerable: ⚠️ Yes
Notes: Affects specific hardware models: HMIBSCEA53D1EDB, HMIBSCEA53D1EDS, HMIBSCEA53D1EDM, HMIBSCEA53D1EDL, HMIBSCEA53D1ESS, HMIBSCEA53D1ESM, HMIBSCEA53D1EML

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could gain administrative control over EV charging infrastructure, modify charging parameters, disrupt operations, or create unauthorized user accounts with elevated privileges.

🟠

Likely Case

Attackers trick authenticated users into changing configuration settings or creating new accounts, potentially leading to service disruption or unauthorized access.

🟢

If Mitigated

With proper clickjacking protections and user awareness, impact is limited to unsuccessful social engineering attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction and social engineering to trick authenticated users into clicking malicious iframes.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: SP8 (Version 01) V4.0.0.13

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-02

Restart Required: Yes

Instructions:

1. Download SP8 (Version 01) V4.0.0.13 from Schneider Electric portal. 2. Backup current configuration. 3. Apply the update following vendor documentation. 4. Restart the system. 5. Verify the update was successful.

🔧 Temporary Workarounds

Implement Clickjacking Protection Headers

all

Add X-Frame-Options header to prevent iframe embedding

X-Frame-Options: DENY
Content-Security-Policy: frame-ancestors 'none'

Network Segmentation

all

Restrict web interface access to trusted networks only

🧯 If You Can't Patch

  • Implement strict network access controls to limit web interface exposure
  • Train users to recognize and avoid clickjacking attempts

🔍 How to Verify

Check if Vulnerable:

Check web interface version in system settings or via SSH if available. Compare against vulnerable version range.

Check Version:

Check via web interface: System > About or similar menu

Verify Fix Applied:

Verify system reports version SP8 (Version 01) V4.0.0.13 or later. Test if web interface can be embedded in iframes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by configuration changes
  • Unusual configuration modifications from unexpected IP addresses

Network Indicators:

  • Web traffic containing iframe embedding attempts
  • Requests with missing or weak X-Frame-Options headers

SIEM Query:

source="web_logs" AND (uri CONTAINS "/admin/" OR uri CONTAINS "/config/") AND (referer CONTAINS "malicious" OR user_agent CONTAINS "iframe")

🔗 References

📤 Share & Export