- Description
- A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P3 (All versions prior to V30.205)
- Source
- cybersecurity@se.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 8.3
- Impact score
- 10
- Exploitability score
- 6.5
- Vector string
- AV:A/AC:L/Au:N/C:C/I:C/A:C
- cybersecurity@se.com
- CWE-120
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p3_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "649BBCC7-C98C-4D79-8940-A80B9C9783E2",
"versionEndExcluding": "30.205"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p3:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "443F068A-C4DC-40B7-A462-CC8BF1D69047"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]