Schneider Electric: CWE331 Insufficient Entropy Enables Session Hijacking
CVE-2026-4827 Published on May 12, 2026

Insufficient Entropy vulnerability on Multiple Products
CWE331 Insufficient Entropy vulnerability exists that could lead to unauthorized access when an attacker on the network can exploit weaknesses in sessionmanagement protections.

NVD

Weakness Type

Insufficient Entropy

The software uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.


Affected Versions

Schneider Electric Easergy MiCOM C264: Schneider Electric Easergy C5: Schneider Electric Easergy MiCOM P30: Schneider Electric Easergy MiCOM P40: Schneider Electric EcoStruxure™ Power Automation System Gateway (EPAS-GTW): Schneider Electric EcoStruxure Power Automation System User Interface (EPAS-UI): Schneider Electric EcoStruxure™ Power Operation: Schneider Electric iPMFLS: Schneider Electric PowerLogic™ P5 Protection Relay: Schneider Electric PowerLogic™ P7 Protection and Control Platform: Schneider Electric PowerLogic™ T300: Schneider Electric PowerLogic™ T500: Schneider Electric Saitel DP: Schneider Electric EasyLogic T150 (formerly Saitel DR):