2024-12-15 03:03:56 +00:00

125 lines
4.0 KiB
JSON

{
"id": "CVE-2022-22725",
"sourceIdentifier": "cybersecurity@se.com",
"published": "2022-02-04T23:15:13.210",
"lastModified": "2024-11-21T06:47:19.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CWE-120: Buffer Copy without Checking Size of Input vulnerability exists that could lead to a buffer overflow causing program crashes and arbitrary code execution when specially crafted packets are sent to the device over the network. Protection functions and tripping function via GOOSE can be impacted. Affected Product: Easergy P3 (All versions prior to V30.205)"
},
{
"lang": "es",
"value": "Una CWE-120: Se presenta una vulnerabilidad de Copia del B\u00fafer sin Comprobar el Tama\u00f1o de la Entrada que podr\u00eda conllevar a un desbordamiento del b\u00fafer que causar\u00eda el bloqueo del programa y la ejecuci\u00f3n de c\u00f3digo arbitrario cuando son enviados paquetes especialmente dise\u00f1ados al dispositivo a trav\u00e9s de la red. Las funciones Protection y la funci\u00f3n tripping por medio de GOOSE pueden verse afectadas. Producto afectado: Easergy P3 (Todas las versiones anteriores a la V30.205)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 8.3,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 6.5,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cybersecurity@se.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:schneider-electric:easergy_p3_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "30.205",
"matchCriteriaId": "649BBCC7-C98C-4D79-8940-A80B9C9783E2"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:schneider-electric:easergy_p3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "443F068A-C4DC-40B7-A462-CC8BF1D69047"
}
]
}
]
}
],
"references": [
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04",
"source": "cybersecurity@se.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-04",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}