Schneider Electric Easergy P5 and P3
Schneider Electric Easergy P3 and P5 relays contain buffer overflow and input validation vulnerabilities that allow an attacker on the local network to disclose device credentials, cause device reboot or denial of service, or execute arbitrary code for full device compromise. The vulnerabilities are in the device protocol implementation and do not require valid credentials or remote network access. No public exploits are known, but these are actively tracked vulnerabilities affecting critical electrical protection equipment.
- Network access to the local network segment where the relay operates (not remotely exploitable)
- No valid credentials required
- No user interaction needed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/19118620-e1f2-4297-8522-e2ab960d2086Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.