CVE-2022-29897

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
11/05/2022
Last modified:
20/05/2022

Description

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd:-:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd\/b_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd\/b:-:*:*:*:*:*:*:*
cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd-bus_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd-bus:-:*:*:*:*:*:*:*


References to Advisories, Solutions, and Tools