cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2021-22747,https://securityvulnerability.io/vulnerability/CVE-2021-22747,Improper Condition Check in Triconex Model 3009 MP on Tricon V11.3.x Systems,"A vulnerability affecting Triconex Model 3009 MP installed on Tricon V11.3.x systems allows for improper checks when the module receives malformed TriStation packets. This scenario can provoke a reset of the module, particularly when the write-protect keyswitch is set to the program position, potentially disrupting system performance and operational integrity.",Schneider Electric,Triconex Model 3009 Mp installed On Tricon V11.3.x Systems,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:42.000Z,0 CVE-2021-22746,https://securityvulnerability.io/vulnerability/CVE-2021-22746,Improper Condition Check in Triconex Model 3009 MP Affects Schneider Electric,"A vulnerability exists in Schneider Electric's Triconex Model 3009 MP that leads to potential disruptions in system operations. When this device operates with Tricon V11.3.x, it becomes susceptible to module resets upon receiving malformed TriStation packets, particularly when the write-protect keyswitch is in the program position. This flaw emphasizes the importance of proper validation checks to maintain the functionality and security of industrial control systems.",Schneider Electric,Triconex Model 3009 Mp installed On Tricon V11.3.x Systems,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:38.000Z,0 CVE-2021-22745,https://securityvulnerability.io/vulnerability/CVE-2021-22745,Improper Condition Check in Triconex Model 3009 MP on Tricon V11.3.x Systems,"A vulnerability has been identified in the Triconex Model 3009 MP, which is present in Tricon V11.3.x systems. This issue arises from improper checks for unusual or exceptional conditions, leading to potential module resets when the Tricon Communication Module (TCM) encounters malformed TriStation packets while the write-protect keyswitch is set to the program position. It is important to assess system configurations and implement safeguards to mitigate the potential impact of this vulnerability.",Schneider Electric,Triconex Model 3009 Mp installed On Tricon V11.3.x Systems,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:33.000Z,0 CVE-2021-22744,https://securityvulnerability.io/vulnerability/CVE-2021-22744,Improper Check Vulnerability in Triconex Model 3009 MP by Schneider Electric,"A vulnerability has been identified in the Triconex Model 3009 MP, which operates on Tricon V11.3.x systems. This issue arises from improper handling of unusual or exceptional conditions. Specifically, when the write-protect keyswitch is set to the program position, the system can reset its modules upon receiving malformed TriStation packets. This flaw may lead to unexpected operational disruptions, requiring immediate attention to mitigate potential risks.",Schneider Electric,Triconex Model 3009 Mp installed On Tricon V11.3.x Systems,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:28.000Z,0 CVE-2021-22743,https://securityvulnerability.io/vulnerability/CVE-2021-22743,Improper Check for Unusual Conditions in Triconex TCM 4351B by Schneider Electric,"A vulnerability exists in the Triconex TCM 4351B system installed on Tricon V11.3.x, where improper handling of unexpected or irregular conditions allows for potential module resets. This issue is triggered when malformed TriStation packets are received while the write-protect keyswitch is set to the program position, which could disrupt normal operations and compromise system reliability.",Schneider Electric,Triconex Tcm 4351b installed On Tricon V11.3.x Systems.,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:22.000Z,0 CVE-2021-22742,https://securityvulnerability.io/vulnerability/CVE-2021-22742,Improper Condition Check in Triconex Model 3009 MP by Schneider Electric,"A vulnerability exists in Triconex Model 3009 MP, affecting systems running Tricon V11.3.x, where a module reset can occur if the TCM receives malformed TriStation packets while the write-protect keyswitch is in the program position. This improper check for unusual conditions can lead to unexpected behavior, impacting the operation of critical automation systems.",Schneider Electric,Triconex Model 3009 Mp installed On Tricon V11.3.x Systems,3.9,LOW,0.00046999999904073775,false,,false,false,false,,,false,false,,2021-05-26T19:20:18.000Z,0 CVE-2018-8872,https://securityvulnerability.io/vulnerability/CVE-2018-8872,,"In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, system calls read directly from memory addresses within the control program area without any verification. Manipulating this data could allow attacker data to be copied anywhere within memory.",Schneider Electric,Triconex Tricon,8.1,HIGH,0.0035200000274926424,false,,false,false,false,,,false,false,,2018-05-04T17:29:00.000Z,0 CVE-2018-7522,https://securityvulnerability.io/vulnerability/CVE-2018-7522,,"In Schneider Electric Triconex Tricon MP model 3008 firmware versions 10.0-10.4, when a system call is made, registers are stored to a fixed memory location. Modifying the data in this location could allow attackers to gain supervisor-level access and control system states.",Schneider Electric,Triconex Tricon,6.7,MEDIUM,0.0005499999970197678,false,,false,false,false,,,false,false,,2018-04-17T00:00:00.000Z,0