{
    "CVE_data_meta": {
        "ASSIGNER": "info@cert.vde.com",
        "DATE_PUBLIC": "2022-05-11T13:00:00.000Z",
        "ID": "CVE-2022-29897",
        "STATE": "PUBLIC",
        "TITLE": "Remote Code Execution in all versions of various RAD-ISM-900-EN-* devices by PHOENIX CONTACT"
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "product": {
                        "product_data": [
                            {
                                "product_name": "RAD-ISM-900-EN-BD/B",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "=",
                                            "version_name": "All Versions",
                                            "version_value": "All Versions"
                                        }
                                    ]
                                }
                            },
                            {
                                "product_name": "RAD-ISM-900-EN-BD",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "=",
                                            "version_name": "All Versions",
                                            "version_value": "All Versions"
                                        }
                                    ]
                                }
                            },
                            {
                                "product_name": "RAD-ISM-900-EN-BD-BUS",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "=",
                                            "version_name": "All Versions",
                                            "version_value": "All Versions"
                                        }
                                    ]
                                }
                            }
                        ]
                    },
                    "vendor_name": "PHOENIX CONTACT"
                }
            ]
        }
    },
    "credit": [
        {
            "lang": "eng",
            "value": "The vulnerabilities were discovered and reported by Logan Carpenter of DRAGOS."
        }
    ],
    "data_format": "MITRE",
    "data_type": "CVE",
    "data_version": "4.0",
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware."
            }
        ]
    },
    "generator": {
        "engine": "Vulnogram 0.0.9"
    },
    "impact": {
        "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
        }
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "CWE-20 Improper Input Validation"
                    }
                ]
            }
        ]
    },
    "references": {
        "reference_data": [
            {
                "name": "https://cert.vde.com/en/advisories/VDE-2022-018/",
                "refsource": "CONFIRM",
                "url": "https://cert.vde.com/en/advisories/VDE-2022-018/"
            }
        ]
    },
    "source": {
        "advisory": "VDE-2022-018",
        "discovery": "EXTERNAL"
    }
}