{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T04:01:51.596","vulnerabilities":[{"cve":{"id":"CVE-2016-5809","sourceIdentifier":"ics-cert@hq.dhs.gov","published":"2017-02-13T21:59:00.407","lastModified":"2025-04-20T01:37:25.860","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. There is no CSRF Token generated to authenticate the user during a session. Successful exploitation of this vulnerability can allow unauthorized configuration changes to be made and saved."},{"lang":"es","value":"Ha sido descubierto un problema en los medidores de potencia de las series IONXXXX, ION73XX, ION75XX, ION76XX, ION8650, ION8800 y PM5XXX de Schneider Electric. No hay Token CSRF generado para autenticar al usuario durante una sesión. La explotación exitosa de esta vulnerabilidad puede permitir que se realicen y se guarden cambios de configuración no autorizados."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion5000:-:*:*:*:*:*:*:*","matchCriteriaId":"B0DA1F9F-A898-4059-93FB-05F5C28280E1"},{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion7300:-:*:*:*:*:*:*:*","matchCriteriaId":"5DD65F3D-EB57-4AB3-BB33-81B42D460AC4"},{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion7500:-:*:*:*:*:*:*:*","matchCriteriaId":"9DC9074B-EA61-4D44-8A16-9E117138629A"},{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion7600:-:*:*:*:*:*:*:*","matchCriteriaId":"CFC7C001-9AB5-453F-BC3B-5544627B06CF"},{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion8650:-:*:*:*:*:*:*:*","matchCriteriaId":"1DA97CA0-DDE0-4418-9D72-7D463C003693"},{"vulnerable":true,"criteria":"cpe:2.3:h:schneider-electric:ion8800:-:*:*:*:*:*:*:*","matchCriteriaId":"B3449157-3715-4D89-A3BD-49EE47160B25"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/92916","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03","source":"ics-cert@hq.dhs.gov","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.exploit-db.com/exploits/44640/","source":"ics-cert@hq.dhs.gov"},{"url":"http://www.securityfocus.com/bid/92916","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://www.exploit-db.com/exploits/44640/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}