Search criteria
6 vulnerabilities found for frauscher_diagnostic_system_102 by frauscher
FKIE_CVE-2023-5500
Vulnerability from fkie_nvd - Published: 2023-12-11 07:15 - Updated: 2024-11-21 08:41
Severity ?
Summary
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-049/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-049/ | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| frauscher | frauscher_diagnostic_system_102 | * | |
| frauscher | frauscher_diagnostic_system_102 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:*:*:*:*:*:fadc:*:*",
"matchCriteriaId": "2FE9E9D7-A692-4C03-883A-6C62DBE46DBD",
"versionEndExcluding": "2.10.2",
"versionStartIncluding": "2.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:*:*:*:*:*:fadci:*:*",
"matchCriteriaId": "D55CB7CF-AB9E-47C2-8E1F-F8AB89E37F7E",
"versionEndExcluding": "2.10.2",
"versionStartIncluding": "2.10.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (\u0027Code Injection\u0027) to gain full control of the affected device."
},
{
"lang": "es",
"value": "Esta vulnerabilidad permite a un atacante remoto con pocos privilegios hacer un uso indebido del control inadecuado de generaci\u00f3n de c\u00f3digo (\"inyecci\u00f3n de c\u00f3digo\") para obtener el control total del dispositivo afectado."
}
],
"id": "CVE-2023-5500",
"lastModified": "2024-11-21T08:41:54.223",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-12-11T07:15:07.160",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-3575
Vulnerability from fkie_nvd - Published: 2022-11-02 17:15 - Updated: 2024-11-21 07:19
Severity ?
Summary
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://www.frauscher.com/en/psirt | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.frauscher.com/en/psirt | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| frauscher | frauscher_diagnostic_system_102 | 2.8.0 | |
| frauscher | frauscher_diagnostic_system_102 | 2.8.0 | |
| frauscher | frauscher_diagnostic_system_102 | 2.9.0 | |
| frauscher | frauscher_diagnostic_system_102 | 2.9.0 | |
| frauscher | frauscher_diagnostic_system_102 | 2.9.1 | |
| frauscher | frauscher_diagnostic_system_102 | 2.9.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.8.0:*:*:*:*:fadc_r2:*:*",
"matchCriteriaId": "F46EB758-1260-40FB-A5D5-87C11CA5964B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.8.0:*:*:*:*:fadci_r2:*:*",
"matchCriteriaId": "ADB27623-E59D-4062-90AB-7787624971B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.9.0:*:*:*:*:fadc_r2:*:*",
"matchCriteriaId": "A66B5545-5CF4-4CD2-93BA-D77D5A889DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.9.0:*:*:*:*:fadci_r2:*:*",
"matchCriteriaId": "FC2D7FAF-C89C-49DC-B85A-BD36E4B7B9A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.9.1:*:*:*:*:fadc_r2:*:*",
"matchCriteriaId": "27810BDA-FED1-48CD-B3D8-6B60C0B9195C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:frauscher:frauscher_diagnostic_system_102:2.9.1:*:*:*:*:fadci_r2:*:*",
"matchCriteriaId": "F32CAEB4-0CCD-463D-AAFE-88AD4FF6D3EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device."
},
{
"lang": "es",
"value": "Frauscher Sensortechnik GmbH FDS102 para FAdC R2 y FAdCi R2 v2.8.0 a v2.9.1 son vulnerables a la carga de c\u00f3digos maliciosos sin autenticaci\u00f3n mediante la funci\u00f3n de carga de configuraci\u00f3n. Esto podr\u00eda provocar un compromiso total del dispositivo FDS102."
}
],
"id": "CVE-2022-3575",
"lastModified": "2024-11-21T07:19:48.033",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2022-11-02T17:15:18.673",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.frauscher.com/en/psirt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.frauscher.com/en/psirt"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
CVE-2023-5500 (GCVE-0-2023-5500)
Vulnerability from cvelistv5 – Published: 2023-12-11 07:13 – Updated: 2024-08-02 07:59
VLAI?
Title
Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability
Summary
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
Severity ?
8.8 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Frauscher | FDS102 for FAdC/FAdCi |
Affected:
2.10.0 , ≤ 2.10.1
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:59:44.783Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "FDS102 for FAdC/FAdCi",
"vendor": "Frauscher",
"versions": [
{
"lessThanOrEqual": "2.10.1",
"status": "affected",
"version": "2.10.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (\u0027Code Injection\u0027) to gain full control of the affected device."
}
],
"value": "This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (\u0027Code Injection\u0027) to gain full control of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-11T07:13:51.308Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
}
],
"source": {
"advisory": "VDE-2023-049",
"defect": [
"CERT@VDE#64600"
],
"discovery": "UNKNOWN"
},
"title": "Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-5500",
"datePublished": "2023-12-11T07:13:51.308Z",
"dateReserved": "2023-10-10T13:52:02.969Z",
"dateUpdated": "2024-08-02T07:59:44.783Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3575 (GCVE-0-2022-3575)
Vulnerability from cvelistv5 – Published: 2022-11-02 16:15 – Updated: 2025-05-05 13:43
VLAI?
Title
Frauscher Sensortechnik Diagnostic System FDS102 for FAdC R2 and FAdCi R2 configuration upload vulnerability
Summary
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
Severity ?
9.8 (Critical)
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Frauscher Sensortechnik | Diagnostic System FDS102 |
Affected:
v2.8.0 , ≤ v2.9.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:14:02.455Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.frauscher.com/en/psirt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3575",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-05T13:43:41.724498Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T13:43:51.404Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Diagnostic System FDS102",
"vendor": "Frauscher Sensortechnik",
"versions": [
{
"lessThanOrEqual": "v2.9.1",
"status": "affected",
"version": "v2.8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-11-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-02T00:00:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://www.frauscher.com/en/psirt"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to v2.9.2 or higher."
}
],
"source": {
"defect": [
"CERT@VDE#64262"
],
"discovery": "INTERNAL"
},
"title": "Frauscher Sensortechnik Diagnostic System FDS102 for FAdC R2 and FAdCi R2 configuration upload vulnerability",
"x_generator": {
"engine": "vulnogram 0.1.0-rc1"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-3575",
"datePublished": "2022-11-02T16:15:33.921Z",
"dateReserved": "2022-10-18T00:00:00.000Z",
"dateUpdated": "2025-05-05T13:43:51.404Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-5500 (GCVE-0-2023-5500)
Vulnerability from nvd – Published: 2023-12-11 07:13 – Updated: 2024-08-02 07:59
VLAI?
Title
Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability
Summary
This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code ('Code Injection') to gain full control of the affected device.
Severity ?
8.8 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Frauscher | FDS102 for FAdC/FAdCi |
Affected:
2.10.0 , ≤ 2.10.1
(semver)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:59:44.783Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "FDS102 for FAdC/FAdCi",
"vendor": "Frauscher",
"versions": [
{
"lessThanOrEqual": "2.10.1",
"status": "affected",
"version": "2.10.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (\u0027Code Injection\u0027) to gain full control of the affected device."
}
],
"value": "This vulnerability allows an remote attacker with low privileges to misuse Improper Control of Generation of Code (\u0027Code Injection\u0027) to gain full control of the affected device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-12-11T07:13:51.308Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-049/"
}
],
"source": {
"advisory": "VDE-2023-049",
"defect": [
"CERT@VDE#64600"
],
"discovery": "UNKNOWN"
},
"title": "Frauscher: FDS102 for FAdC/FAdCi remote code execution vulnerability",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-5500",
"datePublished": "2023-12-11T07:13:51.308Z",
"dateReserved": "2023-10-10T13:52:02.969Z",
"dateUpdated": "2024-08-02T07:59:44.783Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3575 (GCVE-0-2022-3575)
Vulnerability from nvd – Published: 2022-11-02 16:15 – Updated: 2025-05-05 13:43
VLAI?
Title
Frauscher Sensortechnik Diagnostic System FDS102 for FAdC R2 and FAdCi R2 configuration upload vulnerability
Summary
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
Severity ?
9.8 (Critical)
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Frauscher Sensortechnik | Diagnostic System FDS102 |
Affected:
v2.8.0 , ≤ v2.9.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:14:02.455Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.frauscher.com/en/psirt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3575",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-05T13:43:41.724498Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-05T13:43:51.404Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Diagnostic System FDS102",
"vendor": "Frauscher Sensortechnik",
"versions": [
{
"lessThanOrEqual": "v2.9.1",
"status": "affected",
"version": "v2.8.0",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-11-01T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-02T00:00:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://www.frauscher.com/en/psirt"
}
],
"solutions": [
{
"lang": "en",
"value": "Update to v2.9.2 or higher."
}
],
"source": {
"defect": [
"CERT@VDE#64262"
],
"discovery": "INTERNAL"
},
"title": "Frauscher Sensortechnik Diagnostic System FDS102 for FAdC R2 and FAdCi R2 configuration upload vulnerability",
"x_generator": {
"engine": "vulnogram 0.1.0-rc1"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-3575",
"datePublished": "2022-11-02T16:15:33.921Z",
"dateReserved": "2022-10-18T00:00:00.000Z",
"dateUpdated": "2025-05-05T13:43:51.404Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}