A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P3 (All versions prior to V30.205)
References
Link | Resource |
---|---|
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04 | Vendor Advisory |
https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:47
Type | Values Removed | Values Added |
---|---|---|
References | () https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04 - Vendor Advisory |
Information
Published : 2022-02-04 23:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22725
Mitre link : CVE-2022-22725
CVE.ORG link : CVE-2022-22725
JSON object : View
Products Affected
schneider-electric
- easergy_p3_firmware
- easergy_p3
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')