Lucene search

K
Schneider-electricEasergy P5 Firmware

5 matches found

CVE
CVE
added 2022/02/04 11:15 p.m.86 views

CVE-2022-22722

A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and mani...

7.5CVSS7.4AI score0.00158EPSS
CVE
CVE
added 2022/07/13 9:15 p.m.76 views

CVE-2022-34758

A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. Affected Products: Easergy P5 (V01.401.102 and prior)

5.1CVSS5AI score0.003EPSS
CVE
CVE
added 2022/07/13 9:15 p.m.69 views

CVE-2022-34756

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution or the crash of HTTPs stack which is used for the device Web HMI. Affected Products: Easergy P5 (V01.401.102 and prior)

9.8CVSS9.7AI score0.0187EPSS
CVE
CVE
added 2022/02/04 11:15 p.m.68 views

CVE-2022-22723

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be im...

8.8CVSS8.9AI score0.00071EPSS
CVE
CVE
added 2022/07/13 9:15 p.m.53 views

CVE-2022-34757

A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between Easergy Pro software and the device, which may allow an attacker to observe protected communication details. Affected Products: Easergy P5 (V01.401.10...

6.7CVSS5.3AI score0.00174EPSS