CVE-2022-30310

EUVD-2022-52705
In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CERTVDECNA
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
Affected Products (NVD)
VendorProductVersion
festocontroller_cecc-x-m1_firmware
𝑥
≤ 3.8.14
festocontroller_cecc-x-m1_firmware
4.0.14
festocontroller_cecc-x-m1-mv_firmware
𝑥
≤ 3.8.14
festocontroller_cecc-x-m1-mv_firmware
4.0.14
festocontroller_cecc-x-m1-mv-s1_firmware
𝑥
≤ 3.8.14
festocontroller_cecc-x-m1-mv-s1_firmware
4.0.14
festocontroller_cecc-x-m1-ys-l1_firmware
𝑥
≤ 3.8.14
festocontroller_cecc-x-m1-ys-l2_firmware
𝑥
≤ 3.8.14
festocontroller_cecc-x-m1-y-yjkp_firmware
𝑥
≤ 3.8.14
festoservo_press_kit_yjkp_firmware
𝑥
≤ 3.8.14
festoservo_press_kit_yjkp-_firmware
𝑥
≤ 3.8.14
𝑥
= Vulnerable software versions