cvelist/2022/30xxx/CVE-2022-30311.json
2022-06-29 07:14:39 +02:00

215 lines
9.0 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2022-06-08T08:00:00.000Z",
"ID": "CVE-2022-30311",
"STATE": "PUBLIC",
"TITLE": "FESTO: CECC-X-M1 and Servo Press Kit YJKP OS Command Injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Controller CECC-X-M1 (4407603)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1 (8124922)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.0.14",
"version_value": "4.0.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-MV (4407605)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-MV (8124923)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.0.14",
"version_value": "4.0.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-MV-S1 (4407606)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-MV-S1 (8124924)",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "4.0.14",
"version_value": "4.0.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-YS-L1 (8082793)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-YS-L2 (8082794)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Controller CECC-X-M1-Y-YJKP (4803891)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Servo Press Kit YJKP (8077950)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
},
{
"product_name": "Servo Press Kit YJKP- (8058596)",
"version": {
"version_data": [
{
"version_affected": "<=",
"version_name": "3.0.0",
"version_value": "3.8.14"
}
]
}
}
]
},
"vendor_name": "Festo"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Q. Kaiser, M. Illes from ONEKEY Research Labs for reported to Festo"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint \"cecc-x-refresh-request\" POST request doesnt check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-863 Incorrect Authorization"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en/advisories/VDE-2022-020/",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en/advisories/VDE-2022-020/"
}
]
},
"source": {
"advisory": "VDE-2022-020",
"discovery": "EXTERNAL"
}
}