Description
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-34208 | On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware. |
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2022-018/ |
|
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T19:15:11.050Z
Reserved: 2022-04-28T00:00:00.000Z
Link: CVE-2022-29898
No data.
Status : Modified
Published: 2022-05-11T15:15:10.047
Modified: 2024-11-21T06:59:55.680
Link: CVE-2022-29898
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD