On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| phoenixcontact | rad-ism-900-en-bd_firmware | - | - |
| phoenixcontact | rad-ism-900-en-bd\/b_firmware | - | - |
| phoenixcontact | rad-ism-900-en-bd-bus_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
3
Affected Products
2
References
phoenixcontact / rad-ism-900-en-bd_firmware
| - |
| - |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Exploitability
Impact