CVE-2022-4332

In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject and execute arbitrary code and gain full access of the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-tc_ax-3110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-tc_ax-3110:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:35

Type Values Removed Values Added
References () https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - Mitigation, Vendor Advisory () https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - Mitigation, Vendor Advisory

09 Jun 2023, 15:51

Type Values Removed Values Added
CWE CWE-20 NVD-CWE-noinfo
References (MISC) https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - (MISC) https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - Mitigation, Vendor Advisory
CPE cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-tc_ax-3110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-tc_ax-3110:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*

01 Jun 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 06:15

Updated : 2024-11-21 07:35


NVD link : CVE-2022-4332

Mitre link : CVE-2022-4332

CVE.ORG link : CVE-2022-4332


JSON object : View

Products Affected

sprecher-automation

  • sprecon-e-p_dq6-1
  • sprecon-e-tc_ax-3110
  • sprecon-e-p_dl6-1_firmware
  • sprecon-e-p_ds6-0_firmware
  • sprecon-e-p_dq6-1_firmware
  • sprecon-e-tc_ax-3110_firmware
  • sprecon-e-c_firmware
  • sprecon-e-t3_firmware
  • sprecon-e-t3
  • sprecon-e-p_ds6-0
  • sprecon-e-p_dl6-1
  • sprecon-e-c
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo