{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:04:14.414","vulnerabilities":[{"cve":{"id":"CVE-2021-22747","sourceIdentifier":"cybersecurity@se.com","published":"2021-05-26T20:15:09.457","lastModified":"2024-11-21T05:50:35.167","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Check for Unusual or Exceptional Conditions vulnerability exists in Triconex Model 3009 MP installed on Tricon V11.3.x systems that could cause module reset when TCM receives malformed TriStation packets while the write-protect keyswitch is in the program position. This CVE ID is unique from CVE-2021-22742, CVE-2021-22744, CVE-2021-22745, and CVE-2021-22746."},{"lang":"es","value":"Se presenta una vulnerabilidad de Comprobación Inapropiada de Condiciones Inusuales o Excepcionales en Triconex Model 3009 MP instalado en sistemas Tricon versión V11.3.x, que podría causar el reinicio del módulo cuando el TCM recibe paquetes TriStation malformados mientras el interruptor de llave de protección contra escritura está en la posición de programa.&#xa0;Este ID de CVE es diferente de CVE-2021-22742, CVE-2021-22744, CVE-2021-22745 y CVE-2021-22746"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","baseScore":3.9,"baseSeverity":"LOW","attackVector":"PHYSICAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":0.3,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"cybersecurity@se.com","type":"Secondary","description":[{"lang":"en","value":"CWE-754"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:triconex_model_3009_mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.3.0","versionEndExcluding":"11.8.0","matchCriteriaId":"507557DF-0EBA-4203-8F5C-924E4EEEF29F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:triconex_model_3009_mp:-:*:*:*:*:*:*:*","matchCriteriaId":"9AD3F98C-C157-4737-A1B8-CC13252E7D24"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:tcm_4351b_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"11.3.0","versionEndExcluding":"11.5.1","matchCriteriaId":"E12A07EB-7CF9-4CB1-AAFE-D3559F6EF9F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:schneider-electric:tcm_4351b_firmware:11.7.0:*:*:*:*:*:*:*","matchCriteriaId":"73044D19-DBC2-490D-B6F8-714A8C846624"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:schneider-electric:tcm_4351b:-:*:*:*:*:*:*:*","matchCriteriaId":"9779F47B-29FB-4F09-854D-FEEFD4692A37"}]}]}],"references":[{"url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03","source":"cybersecurity@se.com","tags":["Vendor Advisory"]},{"url":"https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-130-03","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}