Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-52705 | In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2022-020/ |
|
Wed, 20 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Sep 2024 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. | In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. |
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-11-20T15:21:04.526Z
Reserved: 2022-05-06T00:00:00.000Z
Link: CVE-2022-30310
Updated: 2024-08-03T06:48:35.696Z
Status : Modified
Published: 2022-06-13T14:15:09.227
Modified: 2024-11-21T07:02:33.033
Link: CVE-2022-30310
No data.
OpenCVE Enrichment
No data.
EUVD