CVE-2023-29413

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to cause Denial-of-Service on Schneider UPS Monitor service by exploiting missing authentication for critical functions. It affects organizations using Schneider Electric UPS monitoring systems with vulnerable versions exposed to untrusted networks.

💻 Affected Systems

Products:
  • Schneider Electric UPS Monitor
Versions: Specific versions not detailed in provided references; consult vendor advisory for exact affected versions.
Operating Systems: Windows-based UPS monitoring systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects UPS Monitor service specifically; actual UPS hardware functionality remains unaffected. Service must be running and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of UPS monitoring, potentially affecting power management visibility and alerting capabilities for critical infrastructure.

🟠

Likely Case

Temporary service interruption requiring manual restart of UPS Monitor service, disrupting monitoring but not affecting actual UPS power delivery.

🟢

If Mitigated

No impact if proper network segmentation and authentication controls prevent unauthorized access to the service.

🌐 Internet-Facing: HIGH - Unauthenticated remote attackers can directly exploit this vulnerability if service is exposed to internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this, but requires network access to the service.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the UPS Monitor service port but no authentication or special tools.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Consult Schneider Electric advisory SEVD-2023-101-04 for specific patched versions

Vendor Advisory: https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2023-101-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2023-101-04.pdf

Restart Required: Yes

Instructions:

1. Download patch from Schneider Electric portal. 2. Apply to affected UPS Monitor installations. 3. Restart UPS Monitor service. 4. Verify service functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to UPS Monitor service to only authorized management systems

firewall rules to block unauthorized access to UPS Monitor port

Service Access Control

all

Implement network-level authentication or VPN for remote access to UPS management

🧯 If You Can't Patch

  • Implement strict network firewall rules to allow only trusted IPs to access UPS Monitor service
  • Place UPS Monitor systems on isolated management network segments

🔍 How to Verify

Check if Vulnerable:

Check if UPS Monitor service is accessible without authentication from untrusted networks

Check Version:

Check UPS Monitor software version in application interface or consult vendor documentation

Verify Fix Applied:

Verify patch version installed and test that unauthenticated requests no longer cause service disruption

📡 Detection & Monitoring

Log Indicators:

  • Multiple connection attempts to UPS Monitor service from unauthorized sources
  • Service restart events without legitimate cause

Network Indicators:

  • Unusual traffic patterns to UPS Monitor service port from unexpected sources

SIEM Query:

source_ip NOT IN (trusted_management_ips) AND destination_port = ups_monitor_port AND protocol = TCP

🔗 References

📤 Share & Export