First published: Thu Jun 02 2022(Updated: )
A CWE-307: Improper Restriction of Excessive Authentication Attempts vulnerability exists that could allow unauthorized access when an attacker uses brute force. Affected Products: Wiser Smart, EER21000 & EER21001 (V4.5 and prior)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wiser Smart EER21000 | <=4.5 | |
Wiser Smart EER21000 | ||
Schneider-electric Wiser Smart Eer21001 | <=4.5 | |
Schneider-electric Wiser Smart Eer21001 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-30235 has a moderate severity rating due to its potential for unauthorized access through brute force attacks.
To fix CVE-2022-30235, update the Wiser Smart EER21000 or EER21001 firmware to a version later than V4.5.
CVE-2022-30235 affects Schneider Electric's Wiser Smart EER21000 and EER21001 firmware versions V4.5 and prior.
Yes, CVE-2022-30235 could potentially lead to unauthorized access and data breaches if exploited.
It is recommended to implement account lockout policies and monitor access logs in addition to updating the firmware for CVE-2022-30235.