A CWE-614 Insufficient Session Expiration vulnerability exists that could allow an attacker to maintain an unauthorized access over a hijacked session to the charger station web server even after the legitimate user account holder has changed his password. Affected Products: EVlink City EVC1S22P4 / EVC1S7P4 (All versions prior to R8 V3.4.0.2 ), EVlink Parking EVW2 / EVF2 / EVP2PE (All versions prior to R8 V3.4.0.2), and EVlink Smart Wallbox EVB1A (All versions prior to R8 V3.4.0.2)
References
Link | Resource |
---|---|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-348-02 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Information
Published : 2022-01-28 12:15
Updated : 2022-02-03 11:12
NVD link : CVE-2021-22820
Mitre link : CVE-2021-22820
JSON object : View
CWE
CWE-613
Insufficient Session Expiration
Products Affected
schneider-electric
- evlink_smart_wallbox_evb1a_firmware
- evlink_parking_evp2pe
- evlink_parking_evp2pe_firmware
- evlink_smart_wallbox_evb1a
- evlink_city_evc1s22p4
- evlink_parking_evw2
- evlink_parking_evf2
- evlink_parking_evw2_firmware
- evlink_city_evc1s7p4
- evlink_city_evc1s22p4_firmware
- evlink_parking_evf2_firmware
- evlink_city_evc1s7p4_firmware