In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-020/ | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2022-020/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 07:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert.vde.com/en/advisories/VDE-2022-020/ - Third Party Advisory |
16 Sep 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. |
10 Aug 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
Summary | In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. |
21 Jul 2023, 16:56
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 |
27 Jun 2022, 16:06
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-863 | |
References | (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-020/ - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 10.0
v3 : 9.8 |
CPE | cpe:2.3:o:festo:controller_cecc-x-m1-y-yjkp_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1-ys-l2:-:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1_firmware:4.0.14:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:4.0.14:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1:-:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1-mv:-:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1-y-yjkp:-:*:*:*:*:*:*:* cpe:2.3:h:festo:servo_press_kit_yjkp-:-:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-ys-l2_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1-ys-l1:-:*:*:*:*:*:*:* cpe:2.3:o:festo:servo_press_kit_yjkp-_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:festo:servo_press_kit_yjkp_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:festo:controller_cecc-x-m1-mv-s1:-:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-ys-l1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:4.0.14:*:*:*:*:*:*:* cpe:2.3:h:festo:servo_press_kit_yjkp:-:*:*:*:*:*:*:* cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:*:*:*:*:*:*:*:* |
13 Jun 2022, 14:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-13 14:15
Updated : 2024-11-21 07:02
NVD link : CVE-2022-30308
Mitre link : CVE-2022-30308
CVE.ORG link : CVE-2022-30308
JSON object : View
Products Affected
festo
- controller_cecc-x-m1-y-yjkp
- controller_cecc-x-m1_firmware
- controller_cecc-x-m1-mv-s1
- controller_cecc-x-m1-y-yjkp_firmware
- servo_press_kit_yjkp_firmware
- controller_cecc-x-m1-mv-s1_firmware
- servo_press_kit_yjkp
- controller_cecc-x-m1-ys-l1
- servo_press_kit_yjkp-_firmware
- servo_press_kit_yjkp-
- controller_cecc-x-m1-ys-l2_firmware
- controller_cecc-x-m1-mv
- controller_cecc-x-m1-ys-l2
- controller_cecc-x-m1-ys-l1_firmware
- controller_cecc-x-m1-mv_firmware
- controller_cecc-x-m1