News

NPCC Security Bulletin: CISA Advisory: Schneider Electric Easergy P5 and P3 Hard-coded Credentials and Classic Buffer Overflow Vulnerabilities

TLP: WHITE

March 3, 2022

CISA Advisory: Schneider Electric Easergy P5 and P3 Hard-coded Credentials and Classic Buffer Overflow Vulnerabilities

CISA issued ICS Advisory (ICSA-22-055-03) on February 24, 2022 regarding Schneider Electric Easergy P5 and P3 Hard-coded Credentials and Classic Buffer Overflow vulnerabilities. Successful exploitation of these vulnerabilities may disclose device credentials, cause a denial-of-service condition, program crashes and arbitrary code execution, device reboot, or allow an attacker to gain full control of the relay. This could result in loss of protection to the electrical network.

Schneider Electric recommends users using Easergy P5 to upgrade to version 01.401.101 and users using Easergy P3 to upgrade to version 30.205 and follow industry cybersecurity best practices. If users choose not to apply the updated versions, they should immediately disable the GOOSE service of the product to reduce the risk of exposure. If GOOSE is needed for the application, use it only in a secure local area network.

CISA Advisory: ICS Advisory (ICSA-22-055-03) Schneider Electric Easergy P5 and P3

CISA Best Practices: Control Systems Security Recommended Practices

CISA’s Defense Strategies: Improving ICS Cybersecurity with Defense-in-Depth Strategies

Schneider Electric’s Security Notifications: SEVD-2022-011-03, SEVD-2022-011-04

Schneider Electric Best Practices: Recommended Cybersecurity Best Practices

View attachmentView attachment
Previous Article
Next Article

Additional News

View All News
There are no additional news items in this category.

NPCC is dedicated to the continued reliability of the bulk power system in Northeastern North America