First published: Mon Jan 30 2023(Updated: )
A CWE-521: Weak Password Requirements vulnerability exists that could allow an attacker to gain control of the device when the attacker brute forces the password. Affected Products: C-Bus Network Automation Controller - LSS5500NAC (Versions prior to V1.10.0), Wiser for C-Bus Automation Controller - LSS5500SHAC (Versions prior to V1.10.0), Clipsal C-Bus Network Automation Controller - 5500NAC (Versions prior to V1.10.0), Clipsal Wiser for C-Bus Automation Controller - 5500SHAC (Versions prior to V1.10.0), SpaceLogic C-Bus Network Automation Controller - 5500NAC2 (Versions prior to V1.10.0), SpaceLogic C-Bus Application Controller - 5500AC2 (Versions prior to V1.10.0)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider Electric 5500AC2 | <1.11.0 | |
Schneider Electric 5500AC2 | ||
Schneider Electric LSS5500NAC | <1.11.0 | |
Schneider Electric 5500 NAC | ||
Schneider Electric 5500 NAC | <1.11.0 | |
Schneider Electric 5500 NAC | ||
Schneider Electric 5500 SHAC | <1.11.0 | |
Schneider Electric LSS5500SHAC | ||
Schneider Electric LSS5500NAC | <1.11.0 | |
Schneider-electric Lss5500nac Firmware | ||
Schneider Electric LSS5500SHAC Firmware | <1.11.0 | |
Schneider Electric LSS5500SHAC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-32513 is classified with a CWE-521 severity due to weak password requirements.
To fix CVE-2022-32513, upgrade the firmware of affected C-Bus Network Automation Controllers to version 1.10.0 or newer.
CVE-2022-32513 affects the C-Bus Network Automation Controller and Wiser for C-Bus Automation Controller prior to firmware version 1.10.0.
An attacker can potentially gain control of the device by brute forcing weak passwords due to CVE-2022-32513.
Yes, a patch is available by updating the firmware for the impacted products to version 1.10.0 or above.