Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-22813 : Security Advisory and Response

Learn about CVE-2021-22813, a critical Cross-site Scripting vulnerability in Schneider Electric products utilizing NMC2 and NMC3. Understand the impact, affected systems, exploitation, and mitigation steps.

A CWE-79 vulnerability exists in Schneider Electric products that could lead to arbitrary script execution when a privileged account interacts with a malicious URL crafted for the Network Management Card (NMC).

Understanding CVE-2021-22813

This CVE identifies a Cross-site Scripting vulnerability affecting various Schneider Electric products using NMC2 and NMC3.

What is CVE-2021-22813?

The vulnerability involves improper input neutralization during web page generation, allowing for script execution via a specially crafted URL targeted at the NMC.

The Impact of CVE-2021-22813

The vulnerability could be exploited by a threat actor to execute arbitrary scripts when a privileged user clicks on a malicious URL, potentially leading to unauthorized access and control of affected systems.

Technical Details of CVE-2021-22813

The vulnerability affects a wide range of Schneider Electric products utilizing NMC2 and NMC3.

Vulnerability Description

The flaw stems from improper input handling, enabling the execution of arbitrary scripts upon interaction with a malicious URL.

Affected Systems and Versions

Products affected include 1-Phase and 3-Phase Uninterruptible Power Supplies (UPS), Rack Power Distribution Units (PDU), 3-Phase Power Distribution Products, Cooling Products, Battery Management System, and more with specific NMC versions.

Exploitation Mechanism

The vulnerability can be exploited by tricking a privileged account into clicking on a specially crafted URL designed to trigger the arbitrary script execution.

Mitigation and Prevention

It is crucial to take immediate steps to secure the affected Schneider Electric products and implement long-term security measures to prevent such vulnerabilities in the future.

Immediate Steps to Take

Ensure that users do not interact with unknown or suspicious URLs, especially those targeting the NMC of Schneider Electric products.

Long-Term Security Practices

Regularly update system software and firmware to patch known vulnerabilities and enhance overall security posture.

Patching and Updates

Schneider Electric may release patches or updates to address the CVE-2021-22813 vulnerability—promptly apply these fixes to mitigate the risk of exploitation.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now