CVE-2022-34756
- EPSS 1.87%
- Published 13.07.2022 21:15:08
- Last modified 21.11.2024 07:10:07
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution or the crash of HTTPs stack which is used for the device Web HMI. Affected Products: Easergy P5 (V01.401.102 and prior)
CVE-2022-34757
- EPSS 0.17%
- Published 13.07.2022 21:15:08
- Last modified 21.11.2024 07:10:07
A CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists where weak cipher suites can be used for the SSH connection between Easergy Pro software and the device, which may allow an attacker to observe protected communication d...
CVE-2022-34758
- EPSS 0.3%
- Published 13.07.2022 21:15:08
- Last modified 21.11.2024 07:10:07
A CWE-20: Improper Input Validation vulnerability exists that could cause the device watchdog function to be disabled if the attacker had access to privileged user credentials. Affected Products: Easergy P5 (V01.401.102 and prior)
CVE-2022-22722
- EPSS 0.16%
- Published 04.02.2022 23:15:13
- Last modified 21.11.2024 06:47:19
A CWE-798: Use of Hard-coded Credentials vulnerability exists that could result in information disclosure. If an attacker were to obtain the SSH cryptographic key for the device and take active control of the local operational network connected to th...
CVE-2022-22723
- EPSS 0.07%
- Published 04.02.2022 23:15:13
- Last modified 21.11.2024 06:47:19
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection fu...