{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T13:35:00.823","vulnerabilities":[{"cve":{"id":"CVE-2021-22744","sourceIdentifier":"cybersecurity@se.com","published":"2021-05-26T20:15:09.357","lastModified":"2024-11-21T05:50:34.800","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex Model 3009 MP installed on Tricon V11.3.x systems that could cause module reset when TCM receives malformed TriStation packets while the write-protect keyswitch is in the program position. This CVE ID is unique from CVE-2021-22742, CVE-2021-22745, CVE-2021-22746, and CVE-2021-22747."},{"lang":"es","value":"Existe una vulnerabilidad de comprobación inadecuada de condiciones inusuales o excepcionales en el modelo 3009 MP de Triconex instalado en sistemas Tricon versión V11.3.x que podría provocar el reinicio del módulo cuando el TCM recibe paquetes TriStation malformados mientras el interruptor de llave de protección contra escritura está en la posición de programa. Este ID de CVE es único respecto a CVE-2021-22742, CVE-2021-22745, CVE-2021-22746 y CVE-2021-22747"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","baseScore":3.9,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":0.3,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cybersecurity@se.com","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:triconex_model_3009_mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.3.0","versionEndExcluding":"11.8.0","matchCriteriaId":"507557DF-0EBA-4203-8F5C-924E4EEEF29F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:triconex_model_3009_mp:-:*:*:*:*:*:*:*","matchCriteriaId":"9AD3F98C-C157-4737-A1B8-CC13252E7D24"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:tcm_4351b_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.3.0","versionEndExcluding":"11.5.1","matchCriteriaId":"E12A07EB-7CF9-4CB1-AAFE-D3559F6EF9F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:tcm_4351b_firmware:11.7.0:*:*:*:*:*:*:*","matchCriteriaId":"73044D19-DBC2-490D-B6F8-714A8C846624"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:tcm_4351b:-:*:*:*:*:*:*:*","matchCriteriaId":"9779F47B-29FB-4F09-854D-FEEFD4692A37"}]}]}],"references":[{"url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}