CVE-2022-30238

8.3 HIGH

📋 TL;DR

CVE-2022-30238 is an authentication bypass vulnerability in Schneider Electric Wiser Smart energy management systems that allows attackers to hijack admin sessions and take over administrative accounts. This affects EER21000 and EER21001 devices running firmware version 4.5 and earlier. Attackers can gain full control of affected energy management systems.

💻 Affected Systems

Products:
  • Schneider Electric Wiser Smart EER21000
  • Schneider Electric Wiser Smart EER21001
Versions: V4.5 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running affected firmware versions are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of energy management system allowing attackers to manipulate power distribution, cause electrical damage, or disrupt operations.

🟠

Likely Case

Unauthorized administrative access leading to data theft, configuration changes, or service disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though authentication bypass remains possible.

🌐 Internet-Facing: HIGH - These devices are often exposed to internet for remote management, making them accessible to attackers worldwide.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires session hijacking capability, but once obtained, authentication bypass is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version after V4.5

Vendor Advisory: https://www.se.com/ww/en/download/document/SEVD-2022-130-03/

Restart Required: Yes

Instructions:

1. Download latest firmware from Schneider Electric portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface. 4. Reboot device. 5. Verify firmware version.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Wiser Smart devices from internet and restrict access to trusted networks only.

Access Control Lists

all

Implement strict firewall rules limiting access to device management interfaces.

🧯 If You Can't Patch

  • Implement network segmentation to isolate vulnerable devices
  • Enable detailed logging and monitoring for suspicious authentication attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under System Information.

Check Version:

No CLI command - check via web interface at /system/info or similar endpoint.

Verify Fix Applied:

Confirm firmware version is above V4.5 in System Information page.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful admin login from unusual IP
  • Session ID reuse from different IP addresses

Network Indicators:

  • Unusual traffic patterns to device management ports (typically 80/443)
  • Authentication requests from unexpected network segments

SIEM Query:

source="wiser-device" AND (event_type="auth_success" AND user="admin" AND src_ip NOT IN trusted_networks)

🔗 References

📤 Share & Export