Schneider Electric Easergy P5 vulnerabilities

4 known vulnerabilities affecting schneider_electric/easergy_p5.

Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH1MEDIUM2

Vulnerabilities

Page 1 of 1
CVE-2022-34756CRITICALCVSS 9.8≥ Firmware, < V01.401.1022022-07-13
CVE-2022-34756 [CRITICAL] CWE-120 CVE-2022-34756: A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remo A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution or the crash of HTTPs stack which is used for the device Web HMI. Affected Products: Easergy P5 (V01.401.102 and prior)
cvelistv5nvd
CVE-2022-34758MEDIUMCVSS 4.9≥ Firmware, < V01.401.1022022-07-13
CVE-2022-34758 [MEDIUM] CWE-20 CVE-2022-34758: A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog functi A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. Affected Products: Easergy P5 (V01.401.102 and prior)
cvelistv5nvd
CVE-2022-34757MEDIUMCVSS 5.3≥ Firmware, < V01.401.1022022-07-13
CVE-2022-34757 [MEDIUM] CWE-327 CVE-2022-34757: A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher s A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between Easergy Pro software and the device, which may allow an attacker to observe protected communication details. Affected Products: Easergy P5 (V01.401.102 and prior)
cvelistv5nvd
CVE-2022-22722HIGHCVSS 7.5≥ unspecified, < 01.401.1012022-02-04
CVE-2022-22722 [HIGH] CWE-798 CVE-2022-22722: A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information discl A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to the product they could potentially observe and manipulate traffic associated with product configuration.
cvelistv5nvd