Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:h:schneider-electric:ion5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0DA1F9F-A898-4059-93FB-05F5C28280E1", "vulnerable": true}, {"criteria": "cpe:2.3:h:schneider-electric:ion7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DD65F3D-EB57-4AB3-BB33-81B42D460AC4", "vulnerable": true}, {"criteria": "cpe:2.3:h:schneider-electric:ion7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC9074B-EA61-4D44-8A16-9E117138629A", "vulnerable": true}, {"criteria": "cpe:2.3:h:schneider-electric:ion7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFC7C001-9AB5-453F-BC3B-5544627B06CF", "vulnerable": true}, {"criteria": "cpe:2.3:h:schneider-electric:ion8650:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA97CA0-DDE0-4418-9D72-7D463C003693", "vulnerable": true}, {"criteria": "cpe:2.3:h:schneider-electric:ion8800:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3449157-3715-4D89-A3BD-49EE47160B25", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved."}, {"lang": "es", "value": "Ha sido descubierto un problema en los medidores de potencia de las series IONXXXX, ION73XX, ION75XX, ION76XX, ION8650, ION8800 y PM5XXX de Schneider Electric. No hay Token CSRF generado para autenticar al usuario durante una sesi\u00f3n. La explotaci\u00f3n exitosa de esta vulnerabilidad puede permitir que se realicen y se guarden cambios de configuraci\u00f3n no autorizados."}], "id": "CVE-2016-5809", "lastModified": "2025-04-20T01:37:25.860", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}], "cvssMetricV30": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2017-02-13T21:59:00.407", "references": [{"source": "ics-cert@hq.dhs.gov", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/92916"}, {"source": "ics-cert@hq.dhs.gov", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03"}, {"source": "ics-cert@hq.dhs.gov", "url": "https://www.exploit-db.com/exploits/44640/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securityfocus.com/bid/92916"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "US Government Resource"], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.exploit-db.com/exploits/44640/"}], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-352"}], "source": "nvd@nist.gov", "type": "Primary"}]}