Vulnerability Description
CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially crafted reset token is entered into the front panel of the device.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Schneider-Electric | Powerlogic P5 Firmware | <= 01.500.104 |
| Schneider-Electric | Powerlogic P5 | All versions |
Related Weaknesses (CWE)
References
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocVendor Advisory
- https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-163-02&p_enDocVendor Advisory
FAQ
What is CVE-2024-5559?
CVE-2024-5559 is a vulnerability with a CVSS score of 6.1 (MEDIUM). CWE-327: Use of a Broken or Risky Cryptographic Algorithm vulnerability exists that could cause denial of service, device reboot, or an attacker gaining full control of the relay when a specially craf...
How severe is CVE-2024-5559?
CVE-2024-5559 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-5559?
Check the references section above for vendor advisories and patch information. Affected products include: Schneider-Electric Powerlogic P5 Firmware, Schneider-Electric Powerlogic P5.