CVE-2022-30262

The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.
References
Link Resource
https://www.forescout.com/blog/ Third Party Advisory
https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-02 Mitigation Third Party Advisory US Government Resource
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:emerson:controlwave_pac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:controlwave_pac:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:emerson:controlwave_micro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:controlwave_micro:-:*:*:*:*:*:*:*

Information

Published : 2022-08-17 08:15

Updated : 2022-08-19 19:43


NVD link : CVE-2022-30262

Mitre link : CVE-2022-30262


JSON object : View

CWE
CWE-345

Insufficient Verification of Data Authenticity

Advertisement

dedicated server usa

Products Affected

emerson

  • controlwave_pac
  • controlwave_pac_firmware
  • controlwave_micro_firmware
  • controlwave_micro