Search criteria
3 vulnerabilities found for easergy_p444_firmware by schneider-electric
FKIE_CVE-2022-22813
Vulnerability from fkie_nvd - Published: 2022-02-09 23:15 - Updated: 2024-11-21 06:47
Severity ?
Summary
A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p141_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AE7F2E59-3CFA-4319-ADE4-1E91F8E3C2D8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p141:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09A782BD-7EB0-4204-A96F-AACCA3E238DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p142_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "72FF1986-01A9-4D9D-B51D-BA5C909139C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p142:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F090CC64-5929-4D4B-8435-28852F1D879B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p143_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "73333D54-11C3-4CB7-AC56-4ECE6835A933",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p143:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE2F2968-6C62-4577-9920-470440A4C7D1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p145_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C773F18-3504-4DBF-82E0-B97AB90340F4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p145:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21B2C060-D432-4581-AAC7-6E88A1C43975",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p241_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23FE0FAF-AE1A-41DB-8BF6-47A233B5DA7C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p241:-:*:*:*:*:*:*:*",
"matchCriteriaId": "027FF962-0E97-4B65-B110-C3FE671798DB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p242_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3399C63B-5A04-41DE-AC74-EDC1820317BE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p242:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D2DC7A6-DC92-41DA-A5F0-894FEB4DD8FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p243_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9A0CF9-F8C6-4E1C-B28D-98B9EF60A7F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p243:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B9C31F9-7AC4-4456-9AC0-D796107713C2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p342_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "78BE0D2A-35C0-423B-99C8-AF94DDFDE833",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p342:-:*:*:*:*:*:*:*",
"matchCriteriaId": "52712D4B-F2CC-455E-A0D6-8F9C7F05963F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p343_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "457C5927-BE93-4D5C-8286-03D6832D60F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p343:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FF21C55-CA9F-483C-8D11-242093D1DE5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p344_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA6A961E-BDC7-4725-B108-841BFAA723AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p344:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35AF5D7A-7234-42C0-8142-5913E7624537",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p345_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1B524D2-7B5A-4536-9A5B-0916160493B0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p345:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F807F701-F5E2-4C3E-B729-08AF6E446C75",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p441_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FCC938A-BA3F-4F82-888A-C462E453E8F5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p441:-:*:*:*:*:*:*:*",
"matchCriteriaId": "664C20E7-89D1-411F-B076-FCD20A8FA297",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p442_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CBB7E681-984E-42D4-A4CC-419754E8EDC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p442:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22AD5B47-F431-400B-8567-04F89F30D72C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p443_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B96FF9E-6BE3-4B7F-888D-216FCEFEFA2D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p443:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23A16B5-B7B1-4D7D-AB0D-165EB3FF0B27",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p444_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6947A474-589F-48F8-99F2-FF259BCC05DC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p444:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA0B415B-4DB4-4773-85AA-2786D56AF440",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p445_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4BDAC9-BB90-477C-AC73-22E482F38BFA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p445:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D7A7B645-4ACA-4A28-BBCD-7D92DD926E4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p446_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54A68CCB-740E-411E-B198-FADEE8589F47",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p446:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54DCCD5C-BD98-4712-B7D5-01F2CC80BE1B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p541_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77624954-DEB9-467D-B36C-A976C809864E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p541:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED68119B-D08A-4D1C-917B-86F11A599762",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p542_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B23F31E-547F-4A7D-AC73-EAA5BAD856E1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p542:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3A0A10D-FFF6-431E-A98F-115BE3DA0BD5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p543_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1D44C50D-BC22-4A60-B5FC-C2C2E6198350",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p543:-:*:*:*:*:*:*:*",
"matchCriteriaId": "466E0679-398B-44FB-B285-67CD07DBFF6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p544_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "66ADF072-F819-4B47-AD73-903317640918",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p544:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C7454F2-5A9D-479A-BB1A-4684348A04E5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p545_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "361C051E-CDBC-4555-959D-F42E8D33A66F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p545:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7706CF3-FBB1-45C8-A50A-8CE6C203E075",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p546_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA4DD9C0-8CBB-4736-95D5-28388FEF3C1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p546:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2F07CD-4FC0-4B54-82D8-D5D33B334AC2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p642_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C2D64E9-E102-4B9B-A659-35660C153536",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p642:-:*:*:*:*:*:*:*",
"matchCriteriaId": "148A4B9A-4059-4E47-9DEB-26DD2E1F670B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p643_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E4DDA982-1987-4E35-8576-B8EE26EF287F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p643:-:*:*:*:*:*:*:*",
"matchCriteriaId": "032D721A-6BB8-4823-8FEE-3677620A746B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p645_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4803D475-C33A-4842-B279-AA52D006C0F7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p645:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26DC666A-FA13-4CAA-8A0A-04C41DBE24E7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p741_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C26AB401-9C28-4A07-8253-49AF18B41318",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p741:-:*:*:*:*:*:*:*",
"matchCriteriaId": "98909729-9D82-4029-A14F-5FBD5BFEE6ED",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p742_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B485C72E-8296-4AC2-9C9C-C53EDF9947C0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p742:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7BDA35D3-4B6F-40E7-8FC5-316273328984",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p743_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "629841D0-09EA-4088-9BDE-16841DCD2168",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p743:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57E9E1E5-BFFA-43BB-A3E3-F29C9DB35919",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p746_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "566E478E-4555-44F6-B07A-D7399FA8E7CC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p746:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BCD24B9-6877-4337-A6C6-486E3AD3B575",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p341_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "358B8AE1-A0EA-4B93-88C2-1337CB9192EC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p341:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F3AFCA0-0B1F-485D-9987-183A7DEA6C5C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p841_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2136FC17-BC4E-4AF3-B0D5-BEFA5A9EB5D0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p841:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AC1D79D-AC01-449D-B1A8-723B175D28FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:schneider-electric:easergy_p849_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95C4134A-F34F-44CA-8509-7D8E2AB53998",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:schneider-electric:easergy_p849:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C81C0B11-6EEC-4CCD-9F27-41179EC880EF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration."
},
{
"lang": "es",
"value": "Una CWE-798: Se presenta una vulnerabilidad de Uso de Credenciales Embebidas. Si un atacante obtuviera la clave criptogr\u00e1fica TLS y tomara el control activo de la red de comunicaci\u00f3n de t\u00faneles de Courier, podr\u00eda potencialmente observar y manipular el tr\u00e1fico asociado a la configuraci\u00f3n del producto"
}
],
"id": "CVE-2022-22813",
"lastModified": "2024-11-21T06:47:29.877",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-02-09T23:15:19.480",
"references": [
{
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
],
"sourceIdentifier": "cybersecurity@se.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-798"
}
],
"source": "cybersecurity@se.com",
"type": "Primary"
}
]
}
CVE-2022-22813 (GCVE-0-2022-22813)
Vulnerability from cvelistv5 – Published: 2022-02-09 22:05 – Updated: 2024-08-03 03:21
VLAI?
Summary
A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.
Severity ?
No CVSS data available.
CWE
- CWE-798 - Use of Hard-coded Credentials
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions) |
Affected:
Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:21:49.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798: Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-09T22:05:06",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2022-22813",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)",
"version": {
"version_data": [
{
"version_value": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798: Use of Hard-coded Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03",
"refsource": "MISC",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2022-22813",
"datePublished": "2022-02-09T22:05:06",
"dateReserved": "2022-01-07T00:00:00",
"dateUpdated": "2024-08-03T03:21:49.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-22813 (GCVE-0-2022-22813)
Vulnerability from nvd – Published: 2022-02-09 22:05 – Updated: 2024-08-03 03:21
VLAI?
Summary
A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration.
Severity ?
No CVSS data available.
CWE
- CWE-798 - Use of Hard-coded Credentials
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions) |
Affected:
Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:21:49.157Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798: Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-09T22:05:06",
"orgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"shortName": "schneider"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cybersecurity@schneider-electric.com",
"ID": "CVE-2022-22813",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)",
"version": {
"version_data": [
{
"version_value": "Easergy P40 Series model numbers with Ethernet option bit as Q, R, S (All PX4X firmware Versions)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A CWE-798: Use of Hard-coded Credentials vulnerability exists. If an attacker were to obtain the TLS cryptographic key and take active control of the Courier tunneling communication network, they could potentially observe and manipulate traffic associated with product configuration."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798: Use of Hard-coded Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03",
"refsource": "MISC",
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-039-03"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "076d1eb6-cfab-4401-b34d-6dfc2a413bdb",
"assignerShortName": "schneider",
"cveId": "CVE-2022-22813",
"datePublished": "2022-02-09T22:05:06",
"dateReserved": "2022-01-07T00:00:00",
"dateUpdated": "2024-08-03T03:21:49.157Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}