Schneider Electric Sage RTU Firmware C3414-500-s02K5_P8

CPE Details

Schneider Electric Sage RTU Firmware C3414-500-s02K5_P8
c3414-500-s02k5_p8
2024-09-04
18h37 +00:00
2024-09-04
18h37 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:schneider-electric:sage_rtu_firmware:c3414-500-s02k5_p8:*:*:*:*:*:*:*

Informations

Vendor

schneider-electric

Product

sage_rtu_firmware

Version

c3414-500-s02k5_p8

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-37040 2024-06-12 16h56 +00:00 CWE-120: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) vulnerability exists that could allow a user with access to the device’s web interface to cause a fault on the device when sending a malformed HTTP request.
8.1
High
CVE-2024-37039 2024-06-12 16h54 +00:00 CWE-252: Unchecked Return Value vulnerability exists that could cause denial of service of the device when an attacker sends a specially crafted HTTP request.
7.5
High
CVE-2024-37038 2024-06-12 16h51 +00:00 CWE-276: Incorrect Default Permissions vulnerability exists that could allow an authenticated user with access to the device’s web interface to perform unauthorized file and firmware uploads when crafting custom web requests.
8.8
High
CVE-2024-37037 2024-06-12 16h50 +00:00 CWE-22: Improper Limitation of a Pathname to a Restricted Directory (‘Path Traversal’) vulnerability exists that could allow an authenticated user with access to the device’s web interface to corrupt files and impact device functionality when sending a crafted HTTP request.
8.1
High
CVE-2024-37036 2024-06-12 16h48 +00:00 CWE-787: Out-of-bounds Write vulnerability exists that could result in an authentication bypass when sending a malformed POST request and particular configuration parameters are set.
9.8
Critical
CVE-2024-5560 2024-06-12 16h45 +00:00 CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the device’s web interface when an attacker sends a specially crafted HTTP request.
7.5
High