Show plain JSON{"id": "CVE-2022-29898", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 9.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "authentication": "SINGLE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "info@cert.vde.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 9.1, "attackVector": "NETWORK", "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 6.0, "exploitabilityScore": 2.3}]}, "published": "2022-05-11T15:15:10.047", "references": [{"url": "https://cert.vde.com/en/advisories/VDE-2022-018/", "tags": ["Vendor Advisory"], "source": "info@cert.vde.com"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Primary", "source": "info@cert.vde.com", "description": [{"lang": "en", "value": "CWE-354"}]}], "descriptions": [{"lang": "en", "value": "On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware."}, {"lang": "es", "value": "En varios dispositivos RAD-ISM-900-EN-* de PHOENIX CONTACT un usuario administrador pod\u00eda usar el cargador de archivos de configuraci\u00f3n en la Interfaz de Usuario Web para ejecutar c\u00f3digo arbitrario con privilegios de root en el Sistema Operativo debido a una comprobaci\u00f3n inapropiada de un valor de verificaci\u00f3n de integridad en todas las versiones del firmware"}], "lastModified": "2022-05-20T14:16:38.113", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E340B2E-0A46-4E95-A766-CCBF66A595FB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71C455BF-7562-43D5-B1D1-57B12F849872"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd\\/b_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F4F1A9B5-C99D-4E2A-95BF-7B4053F5D13E"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd\\/b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FEF17F84-8C87-48A5-A85E-879EE0F86649"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:phoenixcontact:rad-ism-900-en-bd-bus_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9703C8CB-086C-4FFA-8753-6C928096A5E6"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:phoenixcontact:rad-ism-900-en-bd-bus:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B220B2A-8289-4966-B4A3-DF981674D206"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "info@cert.vde.com"}