Description
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could
cause denial of service, device reboot, or an attacker gaining full control of the relay when a
specially crafted reset token is entered into the front panel of the device.
cause denial of service, device reboot, or an attacker gaining full control of the relay when a
specially crafted reset token is entered into the front panel of the device.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46758 | CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device. |
References
History
Fri, 23 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Schneider-electric
Schneider-electric powerlogic P5 Schneider-electric powerlogic P5 Firmware |
|
| CPEs | cpe:2.3:h:schneider-electric:powerlogic_p5:*:*:*:*:*:*:*:* cpe:2.3:o:schneider-electric:powerlogic_p5_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Schneider-electric
Schneider-electric powerlogic P5 Schneider-electric powerlogic P5 Firmware |
Status: PUBLISHED
Assigner: schneider
Published:
Updated: 2024-08-01T21:18:06.557Z
Reserved: 2024-05-31T06:58:51.639Z
Link: CVE-2024-5559
Updated: 2024-08-01T21:18:06.557Z
Status : Modified
Published: 2024-06-12T18:15:12.493
Modified: 2024-11-21T09:47:55.840
Link: CVE-2024-5559
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD