Easergy P5
Schneider Electric has identified multiple vulnerabilities in the Easergy P5 medium voltage protection relay. These vulnerabilities stem from hardcoded credentials (CWE-798) and buffer overflow issues (CWE-120) that allow attackers with network access to disclose device credentials, cause denial of service and device reboot, or gain full control of the relay. Successful exploitation could result in loss of electrical protection to the grid. The vulnerabilities affect all Easergy P5 firmware versions prior to 01.401.101.
- Network access to the Easergy P5 device on the same network segment or adjacent subnet (AV:A per CVSS vector)
- No credentials or authentication required
- No special configuration needed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e98943a0-9749-4b23-92d8-168fdbbd5031Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.