CVE-2022-34757Use of a Broken or Risky Cryptographic Algorithm in Electric Easergy P5

Severity
5.3MEDIUMNVD
CNA6.7
EPSS
0.2%
top 61.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 13
Latest updateJul 14

Description

A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between Easergy Pro software and the device, which may allow an attacker to observe protected communication details. Affected Products: Easergy P5 (V01.401.102 and prior)

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

CVEListV5schneider_electric/easergy_p5FirmwareV01.401.102

Patches

🔴Vulnerability Details

2
GHSA
GHSA-8g4c-686x-3qcc: A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between E2022-07-14
CVEList
CVE-2022-34757: A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between E2022-07-13
CVE-2022-34757 — Electric Easergy P5 vulnerability | cvebase