Festo Controller CECC-X-M1 Firmware 4.0.14

CPE Details

Festo Controller CECC-X-M1 Firmware 4.0.14
4.0.14
2022-06-16
10h43 +00:00
2022-06-24
13h55 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:festo:controller_cecc-x-m1_firmware:4.0.14:*:*:*:*:*:*:*

Informations

Vendor

festo

Product

controller_cecc-x-m1_firmware

Version

4.0.14

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2022-30311 2022-06-13 13h45 +00:00 In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-refresh-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
9.8
Critique
CVE-2022-30310 2022-06-13 13h45 +00:00 In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-acknerr-request" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
9.8
Critique
CVE-2022-30309 2022-06-13 13h45 +00:00 In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-off" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
9.8
Critique
CVE-2022-30308 2022-06-13 13h45 +00:00 In Festo Controller CECC-X-M1 product family in multiple versions, the http-endpoint "cecc-x-web-viewer-request-on" POST request doesn’t check for port syntax. This can result in unauthorized execution of system commands with root privileges due to improper access control command injection.
9.8
Critique