Metrics
Affected Vendors & Products
| Source | ID | Title | 
|---|---|---|
  EUVD | 
                EUVD-2014-5295 | Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local users to cause a denial of service (application halt) via a malformed (1) setting file or (2) disturbance recording file. | 
Solution
Schneider Electric released an update for distribution on August 21, 2014. The VAMPSET setting tool, v.2.2.145 or newer, can be found here: http://www.schneider-electric.com/products/ww/en/2300-ied-user-software/2320-vamp-user-software/62050-vamp-software/ Schneider Electric recommends that all customers and users install and use VAMPSET v.2.2.145 or newer.
Workaround
To protect the computer and configuration files from unauthorized escalation of privileges through manipulation, Schneider Electric recommends users employ best IT practices to secure their computers and relay’s configuration files and to use User Access Control (UAC) to further improve the security of the computer. Additionally, to minimize the risk of attack, users who are not directly using this software on a regular basis are strongly encouraged to delete this application from their computer to reduce the likelihood of attack and to store relay configuration files in the client’s protected location.
Mon, 03 Nov 2025 19:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Title | Schneider Electric VAMPSET Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References | 
         | |
| Metrics | 
        
        
        cvssV2_0
         
  | 
    
        
        
        cvssV2_0
         
  | 
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-11-03T18:52:21.206Z
Reserved: 2014-08-22T00:00:00
Link: CVE-2014-5407
No data.
Status : Deferred
Published: 2014-09-15T14:55:11.697
Modified: 2025-11-03T19:15:38.683
Link: CVE-2014-5407
No data.
                        OpenCVE Enrichment
                    No data.
 EUVD