CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could
cause denial of service, device reboot, or an attacker gaining full control of the relay when a
specially crafted reset token is entered into the front panel of the device.
References
Configurations
Configuration 1 (hide)
AND |
|
History
23 Aug 2024, 16:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:schneider-electric:powerlogic_p5:*:*:*:*:*:*:*:* cpe:2.3:o:schneider-electric:powerlogic_p5_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
References | () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-163-02.pdf - Vendor Advisory | |
First Time |
Schneider-electric powerlogic P5
Schneider-electric powerlogic P5 Firmware Schneider-electric |
13 Jun 2024, 18:36
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
12 Jun 2024, 18:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-06-12 18:15
Updated : 2024-08-23 16:35
NVD link : CVE-2024-5559
Mitre link : CVE-2024-5559
CVE.ORG link : CVE-2024-5559
JSON object : View
Products Affected
schneider-electric
- powerlogic_p5_firmware
- powerlogic_p5
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm