CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
32.5%
Successful exploitation of these vulnerabilities may allow data disclosure or cross-site scripting, which could result in an execution of malicious web code or a loss of device functionality.
The following products are affected, see Schneider Electricβs Security Notification SEVD-2021-313-03 for more details on the affected products:
Uninterruptible Power Supply (UPS) Products
APC Power Distribution Products
Environmental Monitoring
Cooling Products
Battery Management Products
A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC pointing to a delete policy file.
CVE-2021-22810 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
A vulnerability could cause script execution when the request of a privileged account accessing the vulnerable web page is intercepted.
CVE-2021-22811 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC.
CVE-2021-22812 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
A vulnerability could cause arbitrary script execution when a privileged account clicks on a malicious URL specifically crafted for the NMC pointing to an edit policy file.
CVE-2021-22813 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
A vulnerability could cause arbitrary script execution when a malicious file is read and displayed.
CVE-2021-22814 has been assigned to this vulnerability. A CVSS v3 base score of 6.8 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N).
A vulnerability could allow the troubleshooting archive to be accessed.
CVE-2021-22815 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Andrea Palanca of Nozomi Networks and Chua Wei Kiat and Thanh Nguyen of Fortinetβs FortiGuard Labs reported these vulnerabilities.
Schneider Electric recommends the following:
For the products not listed above, Schneider Electric is in the process of establishing a remediation plan for affected NMC2 and NMC3 offers. This plan will include fixes or mitigations for these vulnerabilities. This document will be updated as remediations become available. Until then, users should immediately apply the following mitigations to reduce the risk of exploit:
Schneider Electric strongly recommends the following industry cybersecurity best practices.
CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
CISA also provides a section for control systems security recommended practices on the ICS webpage on us-cert.cisa.gov. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Additional mitigation guidance and recommended practices are publicly available on the ICS webpage on us-cert.cisa.gov in the Technical Information Paper, ICS-TIP-12-146-01BβTargeted Cyber Intrusion Detection and Mitigation Strategies.
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to CISA for tracking and correlation against other incidents.
No known public exploits specifically target these vulnerabilities.
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22810
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22811
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22812
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22813
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22814
web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22815
cisasurvey.gov1.qualtrics.com/jfe/form/SV_9n4TtB8uttUPaM6?product=https://www.cisa.gov/news-events/ics-advisories/icsa-21-313-01
cwe.mitre.org/data/definitions/200.html
cwe.mitre.org/data/definitions/79.html
cwe.mitre.org/data/definitions/79.html
cwe.mitre.org/data/definitions/79.html
cwe.mitre.org/data/definitions/79.html
cwe.mitre.org/data/definitions/79.html
download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-03
download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-313-03
download.schneider-electric.com/files?p_Doc_Ref=SPD_CCON-SURELNOTE_EN&p_enDocType=User+guide&p_File_Name=990-6322E-EN.pdf
download.schneider-electric.com/files?p_enDocType=Firmware&p_Doc_Ref=APC_RPDU2G_706_EN&p_File_Name=apc_hw05_aos704_rpdu2g706_bootmon109.exe
download.schneider-electric.com/files?p_File_Name=990-3403Z-EN.pdf&p_Doc_Ref=SPD_ARAJ-9TN74X_EN&p_enDocType=User+guide
public.govdelivery.com/accounts/USDHSCISA/subscriber/new?topic_id=USDHSCISA_138
twitter.com/CISAgov
twitter.com/intent/tweet?text=Schneider%20Electric%20NMC%20cards%20and%20Embedded%20Devices+https://www.cisa.gov/news-events/ics-advisories/icsa-21-313-01
us-cert.cisa.gov/ics
us-cert.cisa.gov/ics
us-cert.cisa.gov/ics/recommended-practices
us-cert.cisa.gov/ics/tips/ICS-TIP-12-146-01B
us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf
www.apc.com/shop/in/en/products/UPS-Network-Management-Card-v7-0-4-Firmware-for-Smart-UPS-Galaxy-3500-with-AP9630-31-35/P-SFSUMX704
www.apc.com/shop/in/en/products/UPS-Network-Management-Card-v7-0-4-Firmware-for-Symmetra-1-Phase-with-AP9630-31-35/P-SFSY704
www.apc.com/us/en/support/contact-us/
www.apc.com/us/en/support/contact-us/
www.dhs.gov
www.dhs.gov/foia
www.dhs.gov/performance-financial-reports
www.facebook.com/CISA
www.facebook.com/sharer/sharer.php?u=https://www.cisa.gov/news-events/ics-advisories/icsa-21-313-01&title=Schneider%20Electric%20NMC%20cards%20and%20Embedded%20Devices
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N
www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
www.instagram.com/cisagov
www.linkedin.com/company/cybersecurity-and-infrastructure-security-agency
www.linkedin.com/sharing/share-offsite/?url=https://www.cisa.gov/news-events/ics-advisories/icsa-21-313-01
www.oig.dhs.gov/
www.se.com/uk/en/download/document/APC_RPP_704_EN/
www.se.com/ww/en/download/document/APC_NMC3_SU_1511_EN/
www.se.com/ww/en/download/document/APC_NMC3_SY_1511_EN/
www.usa.gov/
www.whitehouse.gov/
www.youtube.com/@cisagov
mailto:?subject=Schneider%20Electric%20NMC%20cards%20and%20Embedded%20Devices&body=www.cisa.gov/news-events/ics-advisories/icsa-21-313-01
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
32.5%