CVE-2022-30311

In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
References
Link Resource
https://cert.vde.com/en/advisories/VDE-2022-020/ Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:festo:controller_cecc-x-m1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-mv:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-mv-s1:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:festo:controller_cecc-x-m1-ys-l1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-ys-l1:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:festo:controller_cecc-x-m1-ys-l2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-ys-l2:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:festo:controller_cecc-x-m1-y-yjkp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-y-yjkp:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:festo:servo_press_kit_yjkp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:servo_press_kit_yjkp:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:festo:servo_press_kit_yjkp-_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:servo_press_kit_yjkp-:-:*:*:*:*:*:*:*

History

10 Aug 2023, 08:15

Type Values Removed Values Added
Summary In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection. In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.

21 Jul 2023, 16:56

Type Values Removed Values Added
CWE CWE-78

27 Jun 2022, 16:08

Type Values Removed Values Added
First Time Festo controller Cecc-x-m1
Festo controller Cecc-x-m1-mv Firmware
Festo controller Cecc-x-m1-y-yjkp
Festo controller Cecc-x-m1-mv
Festo servo Press Kit Yjkp Firmware
Festo controller Cecc-x-m1-ys-l1
Festo servo Press Kit Yjkp
Festo servo Press Kit Yjkp- Firmware
Festo controller Cecc-x-m1 Firmware
Festo controller Cecc-x-m1-ys-l2 Firmware
Festo controller Cecc-x-m1-ys-l2
Festo servo Press Kit Yjkp-
Festo
Festo controller Cecc-x-m1-mv-s1
Festo controller Cecc-x-m1-y-yjkp Firmware
Festo controller Cecc-x-m1-mv-s1 Firmware
Festo controller Cecc-x-m1-ys-l1 Firmware
CWE CWE-78 CWE-863
CVSS v2 : unknown
v3 : 9.8
v2 : 10.0
v3 : 9.8
References (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-020/ - (CONFIRM) https://cert.vde.com/en/advisories/VDE-2022-020/ - Vendor Advisory
CPE cpe:2.3:o:festo:controller_cecc-x-m1_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:h:festo:servo_press_kit_yjkp:-:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-y-yjkp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:servo_press_kit_yjkp-_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1:-:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-mv-s1_firmware:4.0.14:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-ys-l2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-y-yjkp:-:*:*:*:*:*:*:*
cpe:2.3:h:festo:servo_press_kit_yjkp-:-:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-ys-l2:-:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-mv-s1:-:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1-ys-l1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-ys-l1:-:*:*:*:*:*:*:*
cpe:2.3:o:festo:servo_press_kit_yjkp_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:festo:controller_cecc-x-m1_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:festo:controller_cecc-x-m1-mv:-:*:*:*:*:*:*:*

13 Jun 2022, 14:24

Type Values Removed Values Added
New CVE

Information

Published : 2022-06-13 14:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-30311

Mitre link : CVE-2022-30311

CVE.ORG link : CVE-2022-30311


JSON object : View

Products Affected

festo

  • controller_cecc-x-m1-ys-l2_firmware
  • controller_cecc-x-m1-ys-l1
  • controller_cecc-x-m1-y-yjkp
  • controller_cecc-x-m1
  • controller_cecc-x-m1-y-yjkp_firmware
  • controller_cecc-x-m1-mv-s1
  • controller_cecc-x-m1-ys-l1_firmware
  • servo_press_kit_yjkp_firmware
  • servo_press_kit_yjkp
  • servo_press_kit_yjkp-_firmware
  • servo_press_kit_yjkp-
  • controller_cecc-x-m1-mv
  • controller_cecc-x-m1-mv_firmware
  • controller_cecc-x-m1_firmware
  • controller_cecc-x-m1-ys-l2
  • controller_cecc-x-m1-mv-s1_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-863

Incorrect Authorization