First published: Wed Jun 12 2024(Updated: )
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device.
Credit: cybersecurity@se.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Schneider-electric Powerlogic P5 Firmware | <=01.500.104 | |
Schneider-electric Powerlogic P5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5559 is classified as a high severity vulnerability due to its potential for causing device reboot and denial of service.
To fix CVE-2024-5559, update the Schneider Electric Powerlogic P5 firmware to version 01.500.105 or later.
CVE-2024-5559 enables attackers to gain full control of the relay upon entering a specially crafted reset token.
CVE-2024-5559 affects the Schneider Electric Powerlogic P5 devices running firmware versions up to 01.500.104.
The potential risks of CVE-2024-5559 include device boot issues, denial of service, and unauthorized control of critical systems.