CVE-2022-0715

CVSS V2 Medium 6.4 CVSS V3 Critical 9.1
Description
A CWE-287: Improper Authentication vulnerability exists that could cause an attacker to arbitrarily change the behavior of the UPS when a key is leaked and used to upload malicious firmware. Affected Product: APC Smart-UPS Family: SMT Series (SMT Series ID=18: UPS 09.8 and prior / SMT Series ID=1040: UPS 01.2 and prior / SMT Series ID=1031: UPS 03.1 and prior), SMC Series (SMC Series ID=1005: UPS 14.1 and prior / SMC Series ID=1007: UPS 11.0 and prior / SMC Series ID=1041: UPS 01.1 and prior), SCL Series (SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior), SMX Series (SMX Series ID=20: UPS 10.2 and prior / SMX Series ID=23: UPS 07.0 and prior), SRT Series (SRT Series ID=1010/1019/1025: UPS 08.3 and prior / SRT Series ID=1024: UPS 01.0 and prior / SRT Series ID=1020: UPS 10.4 and prior / SRT Series ID=1021: UPS 12.2 and prior / SRT Series ID=1001/1013: UPS 05.1 and prior / SRT Series ID=1002/1014: UPSa05.2 and prior), APC SmartConnect Family: SMT Series (SMT Series ID=1015: UPS 04.5 and prior), SMC Series (SMC Series ID=1018: UPS 04.2 and prior), SMTL Series (SMTL Series ID=1026: UPS 02.9 and prior), SCL Series (SCL Series ID=1029: UPS 02.5 and prior / SCL Series ID=1030: UPS 02.5 and prior / SCL Series ID=1036: UPS 02.5 and prior / SCL Series ID=1037: UPS 03.1 and prior), SMX Series (SMX Series ID=1031: UPS 03.1 and prior)
Overview
  • CVE ID
  • CVE-2022-0715
  • Assigner
  • cybersecurity@se.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-03-09T20:15:08
  • Last Modified Date
  • 2022-05-13T12:58:12
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:schneider-electric:smt_series_1015_ups_firmware:*:*:*:*:*:*:*:* 1 OR 04.5
cpe:2.3:h:schneider-electric:smt_series_1015_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smc_series_1018_ups_firmware:*:*:*:*:*:*:*:* 1 OR 04.2
cpe:2.3:h:schneider-electric:smc_series_1018_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smtl_series_1026_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.9
cpe:2.3:h:schneider-electric:smtl_series_1026_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1029_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.5
cpe:2.3:h:schneider-electric:scl_series_1029_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1030_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.5
cpe:2.3:h:schneider-electric:scl_series_1030_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1036_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.5
cpe:2.3:h:schneider-electric:scl_series_1036_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1037_ups_firmware:*:*:*:*:*:*:*:* 1 OR 03.1
cpe:2.3:h:schneider-electric:scl_series_1037_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smx_series_1031_ups_firmware:*:*:*:*:*:*:*:* 1 OR 03.1
cpe:2.3:h:schneider-electric:smx_series_1031_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smt_series_18_ups_firmware:*:*:*:*:*:*:*:* 1 OR 09.8
cpe:2.3:h:schneider-electric:smt_series_18_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smt_series_1040_ups_firmware:*:*:*:*:*:*:*:* 1 OR 01.2
cpe:2.3:h:schneider-electric:smt_series_1040_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smt_series_1031_ups_firmware:*:*:*:*:*:*:*:* 1 OR 03.1
cpe:2.3:h:schneider-electric:smt_series_1031_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smc_series_1005_ups_firmware:*:*:*:*:*:*:*:* 1 OR 14.1
cpe:2.3:h:schneider-electric:smc_series_1005_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smc_series_1007_ups_firmware:*:*:*:*:*:*:*:* 1 OR 11.0
cpe:2.3:h:schneider-electric:smc_series_1007_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smc_series_1041_ups_firmware:*:*:*:*:*:*:*:* 1 OR 01.1
cpe:2.3:h:schneider-electric:smc_series_1041_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1030_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.5
cpe:2.3:h:schneider-electric:scl_series_1030_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:scl_series_1036_ups_firmware:*:*:*:*:*:*:*:* 1 OR 02.5
cpe:2.3:h:schneider-electric:scl_series_1036_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smx_series_20_ups_firmware:*:*:*:*:*:*:*:* 1 OR 10.2
cpe:2.3:h:schneider-electric:smx_series_20_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:smx_series_23_ups_firmware:*:*:*:*:*:*:*:* 1 OR 07.0
cpe:2.3:h:schneider-electric:smx_series_23_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1010_ups_firmware:*:*:*:*:*:*:*:* 1 OR 08.3
cpe:2.3:h:schneider-electric:srt_series_1010_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1019_ups_firmware:*:*:*:*:*:*:*:* 1 OR 08.3
cpe:2.3:h:schneider-electric:srt_series_1019_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1025_ups_firmware:*:*:*:*:*:*:*:* 1 OR 08.3
cpe:2.3:h:schneider-electric:srt_series_1025_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1020_ups_firmware:*:*:*:*:*:*:*:* 1 OR 10.4
cpe:2.3:h:schneider-electric:srt_series_1020_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1021_ups_firmware:*:*:*:*:*:*:*:* 1 OR 12.2
cpe:2.3:h:schneider-electric:srt_series_1021_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1001_ups_firmware:*:*:*:*:*:*:*:* 1 OR 05.1
cpe:2.3:h:schneider-electric:srt_series_1001_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1013_ups_firmware:*:*:*:*:*:*:*:* 1 OR 05.1
cpe:2.3:h:schneider-electric:srt_series_1013_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1002_ups_firmware:*:*:*:*:*:*:*:* 1 OR a05.2
cpe:2.3:h:schneider-electric:srt_series_1002_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srt_series_1014_ups_firmware:*:*:*:*:*:*:*:* 1 OR a05.2
cpe:2.3:h:schneider-electric:srt_series_1014_ups:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl1000rmxli_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl1000rmxli:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl1000rmxli-nc_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl1000rmxli-nc:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl1500rmxli-nc_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl1500rmxli-nc:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl1500rmxli_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl1500rmxli:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl2200rmxli_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl2200rmxli:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl2200rmxli-nc_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl2200rmxli-nc:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl3000rmxli-nc_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl3000rmxli-nc:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:o:schneider-electric:srtl3000rmxli_firmware:*:*:*:*:*:*:*:* 1 OR 01.0
cpe:2.3:h:schneider-electric:srtl3000rmxli:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:P/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 6.4
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 4.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 9.1
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.2
References
History
Created Old Value New Value Data Type Notes
2022-05-10 15:43:09 Added to TrackCVE
2022-12-06 11:38:26 cybersecurity@schneider-electric.com cybersecurity@se.com CVE Assigner updated
2022-12-06 11:38:26 2022-03-09T20:15Z 2022-03-09T20:15:08 CVE Published Date updated
2022-12-06 11:38:26 2022-05-13T12:58:12 CVE Modified Date updated
2022-12-06 11:38:26 Analyzed Vulnerability Status updated