CVE-2022-4332

In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject and execute arbitrary code and gain full access of the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:sprecher-automation:sprecon-e-tc_ax-3110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-tc_ax-3110:-:*:*:*:*:*:*:*

History

09 Jun 2023, 15:51

Type Values Removed Values Added
CPE cpe:2.3:o:sprecher-automation:sprecon-e-tc_ax-3110_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-t3_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-t3:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-tc_ax-3110:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_ds6-0_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-c:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_dq6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dq6-1:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_dl6-1:-:*:*:*:*:*:*:*
cpe:2.3:o:sprecher-automation:sprecon-e-p_dl6-1_firmware:-:*:*:*:*:*:*:*
cpe:2.3:h:sprecher-automation:sprecon-e-p_ds6-0:-:*:*:*:*:*:*:*
References (MISC) https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - (MISC) https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf - Mitigation, Vendor Advisory
CWE CWE-20 NVD-CWE-noinfo
First Time Sprecher-automation sprecon-e-tc Ax-3110
Sprecher-automation sprecon-e-p Ds6-0 Firmware
Sprecher-automation sprecon-e-p Dq6-1 Firmware
Sprecher-automation sprecon-e-p Dl6-1
Sprecher-automation sprecon-e-c
Sprecher-automation sprecon-e-p Dq6-1
Sprecher-automation sprecon-e-tc Ax-3110 Firmware
Sprecher-automation sprecon-e-t3 Firmware
Sprecher-automation sprecon-e-c Firmware
Sprecher-automation sprecon-e-p Dl6-1 Firmware
Sprecher-automation
Sprecher-automation sprecon-e-t3
Sprecher-automation sprecon-e-p Ds6-0

01 Jun 2023, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-01 06:15

Updated : 2023-12-10 15:01


NVD link : CVE-2022-4332

Mitre link : CVE-2022-4332

CVE.ORG link : CVE-2022-4332


JSON object : View

Products Affected

sprecher-automation

  • sprecon-e-p_ds6-0
  • sprecon-e-c
  • sprecon-e-c_firmware
  • sprecon-e-t3
  • sprecon-e-tc_ax-3110_firmware
  • sprecon-e-tc_ax-3110
  • sprecon-e-p_dq6-1_firmware
  • sprecon-e-t3_firmware
  • sprecon-e-p_dq6-1
  • sprecon-e-p_dl6-1_firmware
  • sprecon-e-p_ds6-0_firmware
  • sprecon-e-p_dl6-1
CWE
NVD-CWE-noinfo CWE-20

Improper Input Validation