In early May 2020, Schneider Electric was made aware of vulnerabilities within Treck Inc.’s embedded TCP/IP stack. Based on the data, information, and analysis provided at the time, Schneider Electric immediately assessed how those vulnerabilities affected our offers and issued a security notification alongside Treck’s public disclosure in June 2020, alerting customers to their risks and encouraging them to take immediate steps to mitigate and remediate those risks as quickly as possible.
On October 12, 2020, Schneider Electric was provided additional information and analysis related to how vulnerabilities in the Treck stack impact APC by Schneider Electric Network Management Cards. This new analysis indicates that the information we had previously received was incomplete. Therefore, the remediation previously provided for this offer is only partially effective. Accordingly, we have updated our original security notification and are expediting an updated remediation.
We continue to investigate if other Schneider Electric offers are impacted by the additional information we have received and will provide updates accordingly. In the meantime, customers should immediately ensure they have implemented cybersecurity best practices across their operations to protect themselves from the vulnerabilities within Treck Inc.’s embedded TCP/IP stack. Where appropriate, this includes locating their systems and remotely accessible devices behind firewalls; installing physical controls to prevent unauthorized access; and preventing mission-critical systems and devices from being accessed from outside networks.
This issue (specific CVE associated with the issues are listed in the security notification here - https://www.se.com/ww/en/download/document/SEVD-2020-174-01/ ) will be resolved via firmware upgrade, links to the various applications are listed below. This kBase is dedicated only to provide APC Network Management Cards firmware updates.
Other NMC Applications will be added to the table as they are released
NOTE: Certain vulnerability scanning software detects for the presense of the Treck stack, and the below firmware revisions may still scan as vulnerable although the issue has been fixed. Please contact the vendor of the scanning software to ensure the plugins have been updated to account for Treck fixes.
Available Remediations
Product
Affected Version
Addressed CVEs
Remediation/Mitigation
Uninterruptible Power Supply (UPS)
NMC2 for UPS models including Smart-UPS, 1-Phase Symmetra, and Galaxy 3500 with Network Management Card 2 (NMC2): (SUMX, SY)