EVlink Parking charging solutions are usually in parking environments, including offices, hotels, supermarkets, fleets, and municipals.
According to the company, the issue is tied to a hard-coded credential bug that could be exploited by attackers to gain access to the system.
The flaw, tracked as CVE-2018-7800 affects the EVLink Parking floor-standing units, v3.2.0-12_v1 and earlier.
“A Hard-coded Credentials vulnerability exists which could enable an attacker to gain access to the device ” reads the security advisory published by Schneider Electric.
Schneider also addressed a code injection vulnerability tracked as CVE-2018-7801 and SQL injection bug tracked as CVE-2018-7802.
The code injection bug, rated as high severity (CVSS 8.8), could be exploited by an attacker to gain access with maximum privileges to the system when remote code execution is performed,
“A Code Injection vulnerability exists which could enable access with maximum privileges when
The SQL Injection vulnerability, rated as medium severity
(CVSS 6.4) could give access to the web interface with full privileges.
The CVE-2018-7801 flaw was reported by Vladimir Kononovich and Vyacheslav Moskvin from Positive Technologies, while the CVE-2018-7800 and CVE-2018-7802 issue were discovered by Vladimir Kononovich from Positive Technologies.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Vehicle Charging Stations)
[adrotate banner=”5″] [adrotate banner=”13″]