10
CVSSv2

CVE-2022-30308

Published: 13/06/2022 Updated: 15/02/2024
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

festo controller_cecc-x-m1_firmware

festo controller_cecc-x-m1_firmware 4.0.14

festo controller_cecc-x-m1-mv_firmware

festo controller_cecc-x-m1-mv_firmware 4.0.14

festo controller_cecc-x-m1-mv-s1_firmware

festo controller_cecc-x-m1-mv-s1_firmware 4.0.14

festo controller_cecc-x-m1-ys-l1_firmware

festo controller_cecc-x-m1-ys-l2_firmware

festo controller_cecc-x-m1-y-yjkp_firmware

festo servo_press_kit_yjkp_firmware

festo servo_press_kit_yjkp-_firmware