Learn about CVE-2022-29897, a critical vulnerability in various RAD-ISM-900-EN-* devices by PHOENIX CONTACT allowing remote code execution. Understand the impact, affected systems, and mitigation steps.
A critical vulnerability, CVE-2022-29897, affecting various RAD-ISM-900-EN-* devices by PHOENIX CONTACT allows an admin user to execute arbitrary code with root privileges due to improper input validation in the firmware.
Understanding CVE-2022-29897
This CVE discloses a flaw that enables an attacker to perform remote code execution on affected devices.
What is CVE-2022-29897?
The vulnerability in RAD-ISM-900-EN-* devices permits a malicious admin user to run arbitrary code with elevated privileges through the traceroute utility in the WebUI, exploiting the lack of proper input validation.
The Impact of CVE-2022-29897
With a CVSS base score of 9.1 (Critical), the flaw poses a severe threat by allowing attackers to compromise confidentiality, integrity, and availability of the impacted systems.
Technical Details of CVE-2022-29897
This section covers specific technical aspects of the vulnerability.
Vulnerability Description
Improper input validation in all versions of the firmware on RAD-ISM-900-EN-* devices enables hackers to execute unauthorized code with root privileges through the traceroute utility.
Affected Systems and Versions
The vulnerability affects all versions of the RAD-ISM-900-EN-BD/B, RAD-ISM-900-EN-BD, and RAD-ISM-900-EN-BD-BUS devices by PHOENIX CONTACT.
Exploitation Mechanism
Attackers can exploit this flaw remotely via the network, with high impact on availability, confidentiality, and integrity, requiring high privileges and no user interaction.
Mitigation and Prevention
Protecting systems from CVE-2022-29897 requires immediate action and long-term security measures.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security advisories from PHOENIX CONTACT and apply relevant patches as soon as they are released.