In Sprecher Automation SPRECON-E-C/P/T3 CPU in variant PU244x a vulnerable firmware verification has been identified. Through physical access and hardware manipulation, an attacker might be able to bypass hardware-based code verification and thus inject and execute arbitrary code and gain full access of the device.
References
Link | Resource |
---|---|
https://www.sprecher-automation.com/fileadmin/itSecurity/PDF/2022-12_Advisories.pdf | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2023-06-01 06:15
Updated : 2023-06-09 15:51
NVD link : CVE-2022-4332
Mitre link : CVE-2022-4332
CVE.ORG link : CVE-2022-4332
JSON object : View
Products Affected
sprecher-automation
- sprecon-e-p_ds6-0_firmware
- sprecon-e-c
- sprecon-e-p_dq6-1
- sprecon-e-tc_ax-3110_firmware
- sprecon-e-tc_ax-3110
- sprecon-e-p_dl6-1_firmware
- sprecon-e-c_firmware
- sprecon-e-p_ds6-0
- sprecon-e-p_dq6-1_firmware
- sprecon-e-t3
- sprecon-e-t3_firmware
- sprecon-e-p_dl6-1
CWE