CVE-2022-42970
📋 TL;DR
CVE-2022-42970 is a critical authentication bypass vulnerability in APC/Schneider Electric Easy UPS Online Monitoring Software that allows unauthenticated attackers to execute arbitrary code with SYSTEM privileges. This affects Windows systems running vulnerable versions of the monitoring software. Attackers can completely compromise affected systems without any authentication.
💻 Affected Systems
- APC Easy UPS Online Monitoring Software
- Schneider Electric Easy UPS Online Monitoring Software
📦 What is this software?
Apc Easy Ups Online Monitoring Software by Schneider Electric
View all CVEs affecting Apc Easy Ups Online Monitoring Software →
Apc Easy Ups Online Monitoring Software by Schneider Electric
View all CVEs affecting Apc Easy Ups Online Monitoring Software →
⚠️ Risk & Real-World Impact
Worst Case
Complete system takeover with SYSTEM privileges, enabling ransomware deployment, data theft, and lateral movement across the network.
Likely Case
Remote code execution leading to malware installation, data exfiltration, and persistent backdoor establishment.
If Mitigated
Limited impact if systems are isolated, but still significant risk due to SYSTEM privilege escalation.
🎯 Exploit Status
No authentication required, making exploitation trivial for attackers with network access. The high CVSS score and critical nature make weaponization likely.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: V2.5-GA, V2.5-GA-01-22261, V2.5-GS, or V2.5-GS-01-22261 (depending on product)
Restart Required: Yes
Instructions:
1. Download the patched version from Schneider Electric/APC website. 2. Uninstall the vulnerable version. 3. Install the patched version (V2.5-GA or later). 4. Restart the system.
🔧 Temporary Workarounds
Network Isolation
windowsBlock network access to the Easy UPS monitoring software at firewall level
# Windows Firewall: New-NetFirewallRule -DisplayName "Block Easy UPS" -Direction Inbound -Program "C:\Program Files\APC\Easy UPS Online Monitoring\*" -Action Block
# Alternative: Block TCP/UDP ports used by the software (check documentation for specific ports)
Service Disablement
windowsTemporarily disable the Easy UPS monitoring service
sc stop "APC Easy UPS Online Monitoring"
sc config "APC Easy UPS Online Monitoring" start= disabled
🧯 If You Can't Patch
- Immediately isolate affected systems from network access, especially from untrusted networks
- Implement strict network segmentation and monitor for unusual outbound connections from UPS monitoring systems
🔍 How to Verify
Check if Vulnerable:
Check installed version in Control Panel > Programs and Features or via PowerShell: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Easy UPS*"} | Select-Object Name, Version
Check Version:
Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Easy UPS*"} | Select-Object Name, Version
Verify Fix Applied:
Verify version is V2.5-GA or later and check that authentication is required for all functions
📡 Detection & Monitoring
Log Indicators:
- Unusual process creation from Easy UPS service
- Failed authentication attempts followed by successful unauthorized access
- Network connections to/from UPS monitoring software from unexpected sources
Network Indicators:
- Unusual traffic patterns to/from UPS monitoring ports
- Unexpected remote code execution attempts via network protocols
SIEM Query:
source="windows" AND (process_name="*Easy UPS*" AND (parent_process!="services.exe" OR command_line="*powershell*" OR command_line="*cmd*"))
🔗 References
- https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf
- https://download.schneider-electric.com/files?p_Doc_SEVD-2022-347-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-347-01_Easy_UPS_Online_Monitoring_Software_Security_Notification.pdf