CVE-2022-22723

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:schneider-electric:easergy_p5_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:schneider-electric:easergy_p5:-:*:*:*:*:*:*:*

History

21 Nov 2024, 06:47

Type Values Removed Values Added
References () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03 - Vendor Advisory () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-03 - Vendor Advisory

Information

Published : 2022-02-04 23:15

Updated : 2024-11-21 06:47


NVD link : CVE-2022-22723

Mitre link : CVE-2022-22723

CVE.ORG link : CVE-2022-22723


JSON object : View

Products Affected

schneider-electric

  • easergy_p5
  • easergy_p5_firmware
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')