First published: Fri Mar 31 2023(Updated: )
Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipulation.This issue affects AC500 V2: from 2.0.0 before 2.8.6.
Credit: cybersecurity@ch.abb.com cybersecurity@ch.abb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Abb Ac500 Cpu Firmware | >=2.0.0<2.8.6 | |
Abb Pm5630-2eth | =2.0 | |
Abb Pm5650-2eth | =2.0 | |
Abb Pm5670-2eth | =2.0 | |
Abb Pm5675-2eth | =2.0 | |
Abb Pm571-eth-v14x | =2.0 | |
Abb Pm571-v14x | =2.0 | |
Abb Pm572 | =2.0 | |
Abb Pm573-eth | =2.0 | |
Abb Pm581-eth-v14x | =2.0 | |
Abb Pm581-v14x | =2.0 | |
Abb Pm582 | =2.0 | |
Abb Pm582-arcnet | =2.0 | |
Abb Pm582-eth | =2.0 | |
Abb Pm582-v14x | =2.0 | |
Abb Pm583-eth | =2.0 | |
Abb Pm585-eth | =2.0 | |
Abb Pm585-mc-kit | =2.0 | |
Abb Pm590-arcnet-v14x | =2.0 | |
Abb Pm590-eth | =2.0 | |
Abb Pm590-eth-v14x | =2.0 | |
Abb Pm590-mc-kit | =2.0 | |
Abb Pm590-v14x | =2.0 | |
Abb Pm591-2eth | =2.0 | |
Abb Pm591-arcnet-v14x | =2.0 | |
Abb Pm591-eth | =2.0 | |
Abb Pm591-eth-v14x | =2.0 | |
Abb Pm591-v14x | =2.0 | |
Abb Pm592-eth | =2.0 | |
Abb Pm595-4eth-f | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3192.
The severity level of CVE-2022-3192 is medium.
The AC500 V2 firmware versions from 2.0.0 to 2.8.6 are affected by CVE-2022-3192.
CVE-2022-3192 allows for client-server protocol manipulation.
There is currently no fix available for CVE-2022-3192. It is recommended to follow the mitigation steps provided by the vendor.