#VU64577 Insufficient verification of data authenticity in Phoenix Contact GmbH products - CVE-2022-31800


Vulnerability identifier: #VU64577

Vulnerability risk: High

CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2022-31800

CWE-ID: CWE-345

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
ILC 1x0
Hardware solutions / Routers & switches, VoIP, GSM, etc
ILC 1x1
Hardware solutions / Routers & switches, VoIP, GSM, etc
ILC 1x1 GSM/GPRS
Hardware solutions / Routers & switches, VoIP, GSM, etc
ILC 3xx
Hardware solutions / Routers & switches, VoIP, GSM, etc
AXC 1050
Hardware solutions / Routers & switches, VoIP, GSM, etc
AXC 1050 XC
Hardware solutions / Routers & switches, VoIP, GSM, etc
AXC 3050
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 480S PN 4TX
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 470 PN 3TX
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 470S PN 3TX
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 460R PN 3TX
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 460R PN 3TX-S
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 430 ETH-IB
Hardware solutions / Routers & switches, VoIP, GSM, etc
RFC 450 ETH-IB
Hardware solutions / Routers & switches, VoIP, GSM, etc
PC WORX RT BASIC
Hardware solutions / Routers & switches, VoIP, GSM, etc
FC 350 PCI ETH
Hardware solutions / Routers & switches, VoIP, GSM, etc
PC WORX SRT
Hardware solutions / Firmware

Vendor: Phoenix Contact GmbH

Description

The vulnerability allows a remote attacker to compromsie the target system.

The vulnerability exists due to insufficient verification of data authenticity of uploaded logic. A remote attacker can execute arbitrary code on the target system.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

ILC 1x0: All versions

ILC 1x1: All versions

ILC 1x1 GSM/GPRS: 2700977

ILC 3xx: All versions

AXC 1050: 2700988

AXC 1050 XC: 2701295

AXC 3050: 2700989

RFC 480S PN 4TX: 2404577

RFC 470 PN 3TX: 2916600

RFC 470S PN 3TX: 2916794

RFC 460R PN 3TX: 2700784

RFC 460R PN 3TX-S: 1096407

RFC 430 ETH-IB: 2730190

RFC 450 ETH-IB: 2730200

PC WORX SRT: 2701680

PC WORX RT BASIC: 2700291

FC 350 PCI ETH: 2730844


External links
https://cert.vde.com/en/advisories/VDE-2022-025/
https://www.cisa.gov/uscert/ics/advisories/icsa-22-172-03


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability