CVE-2022-30262

The Emerson ControlWave 'Next Generation' RTUs through 2022-05-02 mishandle firmware integrity. They utilize the BSAP-IP protocol to transmit firmware updates. Firmware updates are supplied as CAB archive files containing a binary firmware image. In all cases, firmware images were found to have no authentication (in the form of firmware signing) and only relied on insecure checksums for regular integrity checks.
References
Link Resource
https://www.cisa.gov/uscert/ics/advisories/icsa-22-221-02 Mitigation Third Party Advisory US Government Resource
https://www.forescout.com/blog/ Third Party Advisory
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:emerson:controlwave_pac_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:controlwave_pac:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:emerson:controlwave_micro_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:emerson:controlwave_micro:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2022-08-17 15:15

Updated : 2024-02-28 19:29


NVD link : CVE-2022-30262

Mitre link : CVE-2022-30262

CVE.ORG link : CVE-2022-30262


JSON object : View

Products Affected

emerson

  • controlwave_micro
  • controlwave_pac
  • controlwave_pac_firmware
  • controlwave_micro_firmware
CWE
CWE-345

Insufficient Verification of Data Authenticity