First published: Fri Mar 31 2023(Updated: )
Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipulation.This issue affects AC500 V2: from 2.0.0 before 2.8.6.
Credit: cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
ABB AC500 CPU Firmware | >=2.0.0<2.8.6 | |
ABB pm5630-2eth | =2.0 | |
ABB pm5650-2eth | =2.0 | |
ABB PM5670-2ETH | =2.0 | |
ABB pm5675-2eth | =2.0 | |
ABB pm571-v14x | =2.0 | |
ABB PM571 | =2.0 | |
ABB PM572 Firmware | =2.0 | |
ABB pm573 | =2.0 | |
ABB PM581-ETH v14x | =2.0 | |
ABB pm581 | =2.0 | |
ABB PM582 | =2.0 | |
ABB PM582-ARCNET | =2.0 | |
ABB pm582 | =2.0 | |
ABB pm582 | =2.0 | |
ABB PM583 ETH | =2.0 | |
ABB PM585 | =2.0 | |
ABB pm585-mc-kit | =2.0 | |
ABB PM590-ARCNET | =2.0 | |
ABB PM590 ETH | =2.0 | |
ABB pm590-eth | =2.0 | |
ABB pm590-mc-kit | =2.0 | |
ABB pm590-eth | =2.0 | |
ABB pm591-v14x | =2.0 | |
ABB PM591-ARCNET | =2.0 | |
ABB pm591-v14x | =2.0 | |
ABB PM591 ETH v14x | =2.0 | |
ABB PM591 ETH | =2.0 | |
ABB PM592-ETH | =2.0 | |
ABB pm595-4eth-f | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3192.
The severity level of CVE-2022-3192 is medium.
The AC500 V2 firmware versions from 2.0.0 to 2.8.6 are affected by CVE-2022-3192.
CVE-2022-3192 allows for client-server protocol manipulation.
There is currently no fix available for CVE-2022-3192. It is recommended to follow the mitigation steps provided by the vendor.