CVE-2022-29897
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
11/05/2022
Last modified:
20/05/2022
Description
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Base Score 2.0
9.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd\/b_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd\/b:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd-bus_firmware:*:*:*:*:*:*:*:* | ||
| cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd-bus:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



