cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-7513,https://securityvulnerability.io/vulnerability/CVE-2020-7513,Cleartext Storage Vulnerability in Schneider Electric Easergy T300 Firmware,A vulnerability in the Easergy T300 firmware allows for the cleartext storage of sensitive configuration data. This issue could be exploited by attackers to intercept network traffic and gain unauthorized access to sensitive information. Users are advised to ensure they run updated firmware versions to mitigate potential risks.,Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.5,HIGH,0.0016799999866634607,false,,false,false,false,,,false,false,,2020-06-16T19:45:31.000Z,0 CVE-2020-7512,https://securityvulnerability.io/vulnerability/CVE-2020-7512,Platform-Dependent Component Vulnerability in Easergy T300 by Schneider Electric,"A vulnerability related to the use of platform-dependent third party components has been identified in the Easergy T300 device. This issue affects firmware versions 1.5.2 and older, potentially allowing attackers to exploit weaknesses in the third-party component, thereby compromising the security of the device. It is essential for users to assess the impact of this vulnerability and implement appropriate security measures to safeguard their systems.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),9.8,CRITICAL,0.002219999907538295,false,,false,false,false,,,false,false,,2020-06-16T19:45:22.000Z,0 CVE-2020-7511,https://securityvulnerability.io/vulnerability/CVE-2020-7511,Brute Force Vulnerability in Schneider Electric Easergy T300 Firmware,"A vulnerability exists in Schneider Electric's Easergy T300 that stems from the use of a flawed cryptographic algorithm. This issue allows an attacker to exploit the weakness and potentially retrieve passwords by executing a brute force attack. Affected versions, specifically firmware version 1.5.2 and older, need immediate attention to mitigate risks associated with unauthorized access.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.5,HIGH,0.0016799999866634607,false,,false,false,false,,,false,false,,2020-06-16T19:45:13.000Z,0 CVE-2020-7510,https://securityvulnerability.io/vulnerability/CVE-2020-7510,Information Exposure Risk in Easergy T300 Firmware by Schneider Electric,"The Easergy T300 device, specifically firmware version 1.5.2 and older, is susceptible to vulnerabilities that may permit unauthorized access to sensitive information, including private keys. This information exposure can significantly compromise the security of the device, potentially leading to further exploitation. It is essential for users of affected firmware to implement security measures and upgrade to more secure versions to mitigate risks associated with this vulnerability.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.5,HIGH,0.0016799999866634607,false,,false,false,false,,,false,false,,2020-06-16T19:44:55.000Z,0 CVE-2020-7509,https://securityvulnerability.io/vulnerability/CVE-2020-7509,Improper Privilege Management in Easergy T300 by Schneider Electric,"An improper privilege management vulnerability in Schneider Electric's Easergy T300, particularly in firmware version 1.5.2 and earlier, may allow an unauthorized attacker to escalate privileges and potentially delete critical files. This vulnerability underscores the importance of ensuring that privilege management controls are properly implemented to protect systems from unauthorized access and manipulation. For further details and guidance, refer to the official documentation.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.2,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2020-06-16T19:44:37.000Z,0 CVE-2020-7508,https://securityvulnerability.io/vulnerability/CVE-2020-7508,Improper Authentication Control in Easergy T300 by Schneider Electric,"The Easergy T300 from Schneider Electric is affected by a vulnerability that allows attackers to exploit improper restrictions on authentication attempts. This flaw, found in firmware version 1.5.2 and earlier, enables an attacker to perform brute force attacks, potentially leading to unauthorized access to the system. Users should update their firmware to secure their devices against these threats.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),9.8,CRITICAL,0.002219999907538295,false,,false,false,false,,,false,false,,2020-06-16T19:44:18.000Z,0 CVE-2020-7507,https://securityvulnerability.io/vulnerability/CVE-2020-7507,Uncontrolled Resource Consumption Vulnerability in Easergy T300 by Schneider Electric,"An uncontrolled resource consumption vulnerability exists in Schneider Electric's Easergy T300 product. This flaw allows an attacker to repeatedly initiate login attempts, which can lead to a denial of service. If exploited, the vulnerability may disrupt the normal functioning of the Easergy T300, impacting overall system availability and security. Proper remediation is essential to safeguard against malicious exploitation of this vulnerability.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.5,HIGH,0.0010300000431016088,false,,false,false,false,,,false,false,,2020-06-16T19:43:47.000Z,0 CVE-2020-7505,https://securityvulnerability.io/vulnerability/CVE-2020-7505,Code Injection Vulnerability in Easergy T300 by Schneider Electric,"The Easergy T300 by Schneider Electric has a vulnerability that allows attackers to inject malicious data into the firmware. This could lead to the execution of arbitrary code, posing serious security risks to the affected systems. Users of firmware versions 1.5.2 and older should take immediate steps to secure their devices against potential exploitation.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),7.2,HIGH,0.0010499999625608325,false,,false,false,false,,,false,false,,2020-06-16T19:42:41.000Z,0 CVE-2020-7504,https://securityvulnerability.io/vulnerability/CVE-2020-7504,Improper Input Validation in Easergy T300 Firmware by Schneider Electric,"An improper input validation vulnerability exists in Easergy T300 devices, specifically in firmware version 1.5.2 and earlier. This vulnerability can be exploited by attackers who send specially crafted network packets to the device. If successful, the attack could disable the webserver service, potentially disrupting normal operations and opening pathways for further attacks. Organizations using these devices should ensure that they have implemented appropriate security measures to mitigate potential risks.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),5.3,MEDIUM,0.0009200000204145908,false,,false,false,false,,,false,false,,2020-06-16T19:42:25.000Z,0 CVE-2020-7503,https://securityvulnerability.io/vulnerability/CVE-2020-7503,Cross-Site Request Forgery Vulnerability in Easergy T300 by Schneider Electric,"A Cross-Site Request Forgery (CSRF) vulnerability exists in the Easergy T300 firmware, specifically in versions 1.5.2 and older. This security flaw can allow attackers to execute unauthorized commands on behalf of a legitimate user if they are able to intercept the xsrf-token data. This may lead to potential unauthorized access and manipulation of device operations, highlighting the need for prompt updates and security best practices.",Schneider Electric,Easergy T300 (firmware Version 1.5.2 And Older),8.8,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2020-06-16T19:42:10.000Z,0