CVE-2022-42970

9.8 CRITICAL

📋 TL;DR

CVE-2022-42970 is a critical authentication bypass vulnerability in APC/Schneider Electric Easy UPS Online Monitoring Software that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems running vulnerable versions of the monitoring software. Attackers can completely compromise affected systems without any authentication.

💻 Affected Systems

Products:
  • APC Easy UPS Online Monitoring Software
  • Schneider Electric Easy UPS Online Monitoring Software
Versions: All versions prior to V2.5-GA, V2.5-GA-01-22261, V2.5-GS, and V2.5-GS-01-22261
Operating Systems: Windows 7, Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, Windows Server 2022
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both APC and Schneider Electric branded versions of the same software. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with SYSTEM privileges, enabling ransomware deployment, data theft, and lateral movement across the network.

🟠

Likely Case

Remote code execution leading to malware installation, data exfiltration, and persistent backdoor establishment.

🟢

If Mitigated

Limited impact if systems are isolated, but still significant risk due to SYSTEM privilege escalation.

🌐 Internet-Facing: HIGH - Directly exploitable over network without authentication, CVSS 9.8 indicates critical remote risk.
🏢 Internal Only: HIGH - Even internally, the lack of authentication allows any network-connected attacker to exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No authentication required, making exploitation trivial for attackers with network access. The high CVSS score and critical nature make weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: V2.5-GA, V2.5-GA-01-22261, V2.5-GS, or V2.5-GS-01-22261 (depending on product)

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf

Restart Required: Yes

Instructions:

1. Download the patched version from Schneider Electric/APC website. 2. Uninstall the vulnerable version. 3. Install the patched version (V2.5-GA or later). 4. Restart the system.

🔧 Temporary Workarounds

Network Isolation

windows

Block network access to the Easy UPS monitoring software at firewall level

# Windows Firewall: New-NetFirewallRule -DisplayName "Block Easy UPS" -Direction Inbound -Program "C:\Program Files\APC\Easy UPS Online Monitoring\*" -Action Block
# Alternative: Block TCP/UDP ports used by the software (check documentation for specific ports)

Service Disablement

windows

Temporarily disable the Easy UPS monitoring service

sc stop "APC Easy UPS Online Monitoring"
sc config "APC Easy UPS Online Monitoring" start= disabled

🧯 If You Can't Patch

  • Immediately isolate affected systems from network access, especially from untrusted networks
  • Implement strict network segmentation and monitor for unusual outbound connections from UPS monitoring systems

🔍 How to Verify

Check if Vulnerable:

Check installed version in Control Panel > Programs and Features or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Easy UPS*"} | Select-Object Name, Version

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Easy UPS*"} | Select-Object Name, Version

Verify Fix Applied:

Verify version is V2.5-GA or later and check that authentication is required for all functions

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Easy UPS service
  • Failed authentication attempts followed by successful unauthorized access
  • Network connections to/from UPS monitoring software from unexpected sources

Network Indicators:

  • Unusual traffic patterns to/from UPS monitoring ports
  • Unexpected remote code execution attempts via network protocols

SIEM Query:

source="windows" AND (process_name="*Easy UPS*" AND (parent_process!="services.exe" OR command_line="*powershell*" OR command_line="*cmd*"))

🔗 References

📤 Share & Export