cve/2022/CVE-2022-34756.md

18 lines
898 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-34756](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-34756)
![](https://img.shields.io/static/v1?label=Product&message=Easergy%20P5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=Firmware%3C%20V01.401.102%20%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Overflow&color=brighgreen)
### Description
A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could result in remote code execution or the crash of HTTPs stack which is used for the device Web HMI. Affected Products: Easergy P5 (V01.401.102 and prior)
### POC
#### Reference
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-193-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2022-193-04_Easergy_P5_Security_Notification.pdf
#### Github
No PoCs found on GitHub currently.