CVE-2022-0902
Summary
| CVE | CVE-2022-0902 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-07-21 16:15:00 UTC |
| Updated | 2023-06-27 15:50:00 UTC |
| Description | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'), Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in flow computer and remote controller products of ABB ( RMC-100 (Standard), RMC-100-LITE, XIO, XFCG5 , XRCG5 , uFLOG5 , UDC) allows an attacker who successfully exploited this vulnerability could insert and run arbitrary code in an affected system node. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Abb | Rmc-100 | - | All | All | All |
| Hardware | Abb | Rmc-100-lite | - | All | All | All |
| Operating System | Abb | Rmc-100-lite Firmware | All | All | All | All |
| Operating System | Abb | Rmc-100 Firmware | All | All | All | All |
| Hardware | Abb | Udc | - | All | All | All |
| Operating System | Abb | Udc Firmware | All | All | All | All |
| Hardware | Abb | Uflog5 | - | All | All | All |
| Operating System | Abb | Uflog5 Firmware | All | All | All | All |
| Hardware | Abb | Xfcg5 | - | All | All | All |
| Operating System | Abb | Xfcg5 Firmware | All | All | All | All |
| Hardware | Abb | Xio | - | All | All | All |
| Operating System | Abb | Xio Firmware | All | All | All | All |
| Hardware | Abb | Xrcg5 | - | All | All | All |
| Operating System | Abb | Xrcg5 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| search.abb.com/library/Download.aspx | MISC | search.abb.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: ABB thanks Vera Mens at Claroty Research for helping to identify the vulnerabilities and protecting our customers.
There are currently no legacy QID mappings associated with this CVE.