Critical Vulnerabilities in Schneider Electric APC Easy UPS Online Monitoring Software
Take action: If you are using APC/Schneider Electric Easy UPS Online Monitoring Software update it as soon as you can. Or isolate it in a locked network not visible from the Internet.
Learn More
Schneider Electric has identified multiple critical vulnerabilities in their APC Easy UPS Online Monitoring Software, affecting versions up to and including v2.5-GA-01-22261 and Schneider Electric Easy UPS Online Monitoring Software version V2.5-GA-01-22320 and prior. These vulnerabilities are significant due to their high severity scores and the potential for remote exploitation.
Affected Products are Schneider Electric /APC Easy UPS Online Monitoring Software: v2.5-GA-01-22261 and prior
Vulnerability Overview
CVE-2023-29411(CVSS сcore 9.8) - Missing Authentication for Critical Function - This vulnerability allows changes to administrative credentials without requiring prior authentication on the Java RMI interface, potentially leading to remote code execution.
CVE-2023-29412 (CVSS сcore 9.8) - Improper Neutralization of Special Elements used in an OS Command - This OS Command Injection vulnerability could cause remote code execution when internal methods are manipulated through the Java RMI interface.
CVE-2023-29413 (CVSS сcore 7.5) - Missing Authentication for Critical Function - This vulnerability could cause a denial-of-service condition when accessed by an unauthenticated user on the Schneider UPS Monitor service.
Users are strongly recommended to update to the latest version of APC Easy UPS Online Monitoring Software that addresses these vulnerabilities.