Schneider Electric security teams reported the discovery of a set of critical vulnerabilities in its PowerLogic EGX100 and PowerLogic EGX3000 communication solutions, which are part of the company’s family of control and supervision products, although they have already reached the end of their useful life.
According to the report, successful exploitation of these flaws would allow threat actors to deploy denial of service (DoS) attacks, account hijacking, and remote code execution on the affected devices.
Below is a list of reported vulnerabilities, in addition to their respective CVE tracking key and Common Vulnerability Scoring System (CVSS) score. Each of the following flaws resides in the two affected products, resulting in a total of 12 security errors:
CVE-2021-22763: A weakness in the forgotten password recovery mechanism would allow an attacker to access a device with administrator privileges. The flaw received a CVSS score of 8.1/10.
CVE-2021-22764: Improper authentication vulnerability that could cause loss of connectivity to the device via the Modbus TCP protocol if a malicious hacker sends a specially crafted HTTP request.
This flaw received a score of 5.3/10.
CVE-2021-22765: Incorrect input validation flaw that could be exploited by remote hackers for the deployment of a DoS condition by sending specially crafted HTTP packets. This is a critical flaw and received a CVSS score of 9.8/10.
CVE-2021-22766: Improper input validation vulnerability that could cause a DoS condition by sending specially crafted HTTPS packets.
The flaw received a CVSS score of 5.7/10.
CVE-2021-22767: An incorrect input validation error in affected products would allow the deployment of a DoS condition through a specially crafted HTTP packet.
This flaw received a CVSS score of 9.8/10, so it is considered a critical safety issue.
CVE-2021-22768: Incorrect input validation error that could cause a DoS condition or remote code execution through a specially crafted HTTP package. This vulnerability received a CVSS score of 9.8/10.
Schneider Electric published some recommendations so that users of affected deployments can mitigate the risk of exploitation of these flaws.
As mentioned at the beginning, the PowerLogic EGX100 and EGX300 products have been discontinued and are no longer supported. Customers can replace devices or implement vendor-recommended mitigations to reduce the risk of exploitation.
For more information on hacking incidents, cybersecurity, malware attacks and security tips, feel free to access the platforms of the International Institute of Cyber Security (IICS).
The post 12 DoS and remote code execution vulnerabilities in Schneider PowerLogic EGX100 and PowerLogicEGX300 power monitoring devices appeared first on Cyber Security News | Exploit One | Hacking News.