First published: Wed Jul 13 2022(Updated: )
A CWE-269: Improper Privilege Management vulnerability exists that could allow elevated functionality when guessing credentials. Affected Products: Acti9 PowerTag Link C (A9XELC10-A) (V1.7.5 and prior), Acti9 PowerTag Link C (A9XELC10-B) (V2.12.0 and prior)
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
Schneider-electric Acti9 Powertag Link C (a9xelc10-a) Firmware | <=1.7.5 | |
Schneider-electric Acti9 Powertag Link C (a9xelc10-a) | ||
Schneider Electric Acti9 Powertag Link C (a9xelc10-b) Firmware | <=2.12.0 | |
Schneider-electric Acti9 Powertag Link C (a9xelc10-b) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-34754 has a moderate severity due to the potential for improper privilege management.
To fix CVE-2022-34754, update the Acti9 PowerTag Link C firmware to version 1.7.6 or later for model A9XELC10-A and to version 2.12.1 or later for model A9XELC10-B.
CVE-2022-34754 affects the Acti9 PowerTag Link C models A9XELC10-A with firmware versions 1.7.5 and earlier, and A9XELC10-B with firmware versions 2.12.0 and earlier.
The vulnerability in CVE-2022-34754 is related to improper privilege management that may allow unauthorized users to gain elevated functionality.
Yes, CVE-2022-34754 is categorized under CWE-269, which stands for improper privilege management.