CVE-2022-31491

10.0 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated remote attackers to execute arbitrary code on Voltronic Power management systems via the web interface. It affects ViewPower, ViewPower Pro, and PowerShield Netguard products regardless of UPS device state or presence. Organizations using these systems for power management are at immediate risk.

💻 Affected Systems

Products:
  • Voltronic Power ViewPower
  • ViewPower Pro
  • PowerShield Netguard
Versions: ViewPower through 1.04-24215, ViewPower Pro through 2.0-22165, PowerShield Netguard before 1.04-23292
Operating Systems: Embedded systems running Voltronic firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All affected versions are vulnerable in default configuration. No authentication required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent malware, disrupt power management systems, pivot to internal networks, and cause physical damage to connected equipment.

🟠

Likely Case

Attackers gain full control of affected systems to deploy ransomware, steal credentials, or use as foothold for lateral movement within the network.

🟢

If Mitigated

If properly segmented and monitored, impact limited to isolated power management systems with minimal data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in security advisories. Attack requires network access to web interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ViewPower 1.04-24216+, ViewPower Pro 2.0-22166+, PowerShield Netguard 1.04-23292+

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-182-05

Restart Required: Yes

Instructions:

1. Contact Voltronic Power for updated firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Restart system. 5. Verify version update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate affected systems from internet and restrict network access

Configure firewall rules to block all inbound traffic to affected systems except from management stations

Access Control

all

Implement network-level authentication and access controls

Use VPN or jump host for management access
Implement IP whitelisting for management interfaces

🧯 If You Can't Patch

  • Immediately disconnect affected systems from internet and restrict to isolated VLAN
  • Implement strict network monitoring and alerting for any access attempts to affected systems

🔍 How to Verify

Check if Vulnerable:

Check web interface version at http://[device-ip]/ or review firmware version in management console

Check Version:

curl -s http://[device-ip]/version or check web interface login page

Verify Fix Applied:

Verify firmware version matches patched versions listed above

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated web requests to UPS management endpoints
  • Unusual process execution or file creation on affected systems

Network Indicators:

  • HTTP requests to /cgi-bin/ or similar paths on port 80/443 of affected systems
  • Unusual outbound connections from power management systems

SIEM Query:

source_ip=* dest_ip=[UPS_IP] (http_method=POST OR http_method=GET) uri_path="/cgi-bin/*"

🔗 References

📤 Share & Export