Lucene search

K
cve[email protected]CVE-2022-34757
HistoryJul 13, 2022 - 9:15 p.m.

CVE-2022-34757

2022-07-1321:15:08
CWE-327
web.nvd.nist.gov
36
3
cve-2022-34757
cwe-327
vulnerability
easergy pro software
ssh
weak cipher suites
nvd

6.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.5%

A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between Easergy Pro software and the device, which may allow an attacker to observe protected communication details. Affected Products: Easergy P5 (V01.401.102 and prior)

Affected configurations

NVD
Node
schneider-electriceasergy_p5_firmwareRange01.401.102
AND
schneider-electriceasergy_p5Match-

CNA Affected

[
  {
    "product": "Easergy P5",
    "vendor": "Schneider Electric",
    "versions": [
      {
        "lessThan": "V01.401.102 ",
        "status": "affected",
        "version": "Firmware",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.7 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.5%

Related for CVE-2022-34757