Fortinet Discovers Schneider Electric Smart-UPS SRT 5000 Authentication Bypass Vulnerability
Fortinet's FortiGuard Labs had discovered an Authentication Bypass vulnerability in Scheduled UPS Configuration of Schneider Electric Smart-UPS SRT 5000 .
Schneider Electric Smart-UPS is an intelligent and efficient network power protection from entry level to scaleable runtime.
The vulnerability is caused by insufficient authentication in Smart-UPS SRT 5000 Scheduled UPS configuration page. Upon successful exploitation, it allows an attacker with access to the IP and URL to bypass the login mechanism.
Users should apply the solution provided by Schneider Electric.
The vulnerability can be mitigated by enabling "Require Authentication Cookie" under "Configuration > Network > Web".
The vulnerability affected Schneider Electric Smart-UPS SRT 5000 Network Management Card 2 (NMC2) Policy Configuration version 6.9.6 and earlier.
Fortinet reported the vulnerability to Schneider Electric on 13th January, 2021.
Schneider Electric confirmed the vulnerability on 20th January, 2021.
Schneider Electric released patch for the vulnerability on 9th November, 2021.