cvelist/2022/29xxx/CVE-2022-29898.json
2022-05-11 16:21:09 +02:00

119 lines
4.3 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2022-05-11T13:00:00.000Z",
"ID": "CVE-2022-29898",
"STATE": "PUBLIC",
"TITLE": "Remote Code Execution in all versions of various RAD-ISM-900-EN-* devices by PHOENIX CONTACT"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "RAD-ISM-900-EN-BD/B",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "All Versions",
"version_value": "All Versions"
}
]
}
},
{
"product_name": "RAD-ISM-900-EN-BD",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "All Versions",
"version_value": "All Versions"
}
]
}
},
{
"product_name": "RAD-ISM-900-EN-BD-BUS",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "All Versions",
"version_value": "All Versions"
}
]
}
}
]
},
"vendor_name": "PHOENIX CONTACT"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "The vulnerabilities were discovered and reported by Logan Carpenter of DRAGOS."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": " CWE-354 Improper Validation of Integrity Check Value"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en/advisories/VDE-2022-018/",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en/advisories/VDE-2022-018/"
}
]
},
"source": {
"advisory": "VDE-2022-018",
"discovery": "EXTERNAL"
}
}