Логотип exploitDog
bind:CVE-2022-22723
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-22723

Количество 3

Количество 3

nvd логотип

CVE-2022-22723

около 4 лет назад

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-mm7j-7gq2-x4fr

почти 4 года назад

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)

EPSS: Низкий
fstec логотип

BDU:2022-01051

около 4 лет назад

Уязвимость реализации протокола GOOSE (Generic Object-Oriented Substation Event) микропрограммного обеспечения устройств релейной защиты и управления Schneider Electric Easergy P5, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-22723

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)

CVSS3: 8.8
0%
Низкий
около 4 лет назад
github логотип
GHSA-mm7j-7gq2-x4fr

A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P5 (All firmware versions prior to V01.401.101)

0%
Низкий
почти 4 года назад
fstec логотип
BDU:2022-01051

Уязвимость реализации протокола GOOSE (Generic Object-Oriented Substation Event) микропрограммного обеспечения устройств релейной защиты и управления Schneider Electric Easergy P5, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании

CVSS3: 8.8
0%
Низкий
около 4 лет назад

Уязвимостей на страницу