Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
3 vulnerabilities found for MSE6-E2M-5000-FB43-AGD by Festo
CVE-2023-3634 (GCVE-0-2023-3634)
Vulnerability from nvd – Published: 2026-04-16 04:40 – Updated: 2026-04-16 13:51
VLAI?
Title
Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions
Summary
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability.
Severity ?
8.8 (High)
CWE
- CWE-1242 - Inclusion of Undocumented Features or Chicken Bits
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Festo | MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L4-AGD |
Affected:
*
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2026-03-06 08:15
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3634",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-16T13:51:13.277265Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T13:51:55.114Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L4-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L5-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB43-D-M-RG-BAR-M12L4-MQ1-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB43-D-M-RG-BAR-M12L5-MQ1-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB44-D-M-RG-BAR-AMI-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB44-D-RG-BAR-AMI-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-D2M-5000-CBUS-S-RG-BAR-VCB-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB13-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB36-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB37-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB43-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB44-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb36-d-m-rg-bar-m12l4-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb36-d-m-rg-bar-m12l5-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb43-d-m-rg-bar-m12l4-mq1-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb43-d-m-rg-bar-m12l5-mq1-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb44-d-m-rg-bar-ami-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb44-d-rg-bar-ami-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-d2m-5000-cbus-s-rg-bar-vcb-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb13-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb36-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb37-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb43-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb44-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2026-03-06T08:15:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability."
}
],
"value": "In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1242",
"description": "CWE-1242 Inclusion of Undocumented Features or Chicken Bits",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T04:40:29.960Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/de/advisories/VDE-2023-020/"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://festo.csaf-tp.certvde.com/.well-known/csaf/white/2023/fsa-202304.json"
}
],
"source": {
"advisory": "VDE-2023-020",
"defect": [
"CERT@VDE#64559"
],
"discovery": "INTERNAL"
},
"title": "Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-3634",
"datePublished": "2026-04-16T04:40:29.960Z",
"dateReserved": "2023-07-12T12:07:06.056Z",
"dateUpdated": "2026-04-16T13:51:55.114Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2023-3634 (GCVE-0-2023-3634)
Vulnerability from cvelistv5 – Published: 2026-04-16 04:40 – Updated: 2026-04-16 13:51
VLAI?
Title
Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions
Summary
In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability.
Severity ?
8.8 (High)
CWE
- CWE-1242 - Inclusion of Undocumented Features or Chicken Bits
Assigner
References
| URL | Tags | |
|---|---|---|
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Festo | MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L4-AGD |
Affected:
*
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Date Public ?
2026-03-06 08:15
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-3634",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-16T13:51:13.277265Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T13:51:55.114Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L4-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB36-D-M-RG-BAR-M12L5-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB43-D-M-RG-BAR-M12L4-MQ1-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB43-D-M-RG-BAR-M12L5-MQ1-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB44-D-M-RG-BAR-AMI-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-C2M-5000-FB44-D-RG-BAR-AMI-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-D2M-5000-CBUS-S-RG-BAR-VCB-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB13-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB36-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB37-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB43-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSE6-E2M-5000-FB44-AGD",
"vendor": "Festo",
"versions": [
{
"status": "affected",
"version": "*"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb36-d-m-rg-bar-m12l4-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb36-d-m-rg-bar-m12l5-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb43-d-m-rg-bar-m12l4-mq1-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb43-d-m-rg-bar-m12l5-mq1-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb44-d-m-rg-bar-ami-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-c2m-5000-fb44-d-rg-bar-ami-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-d2m-5000-cbus-s-rg-bar-vcb-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb13-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb36-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb37-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb43-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:festo:mse6-e2m-5000-fb44-agd_firmware:*:*:*:*:*:*:*:*",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"datePublic": "2026-03-06T08:15:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability."
}
],
"value": "In products of the MSE6 product-family by Festo a remote authenticated, low privileged attacker could use functions of undocumented test mode which could lead to a complete loss of confidentiality, integrity and availability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1242",
"description": "CWE-1242 Inclusion of Undocumented Features or Chicken Bits",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-16T04:40:29.960Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://certvde.com/de/advisories/VDE-2023-020/"
},
{
"tags": [
"vendor-advisory"
],
"url": "https://festo.csaf-tp.certvde.com/.well-known/csaf/white/2023/fsa-202304.json"
}
],
"source": {
"advisory": "VDE-2023-020",
"defect": [
"CERT@VDE#64559"
],
"discovery": "INTERNAL"
},
"title": "Festo: MSE6-C2M/D2M/E2M Incomplete User Documentation of Remote Accessible Functions",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-3634",
"datePublished": "2026-04-16T04:40:29.960Z",
"dateReserved": "2023-07-12T12:07:06.056Z",
"dateUpdated": "2026-04-16T13:51:55.114Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
VAR-202503-2639
Vulnerability from variot - Updated: 2025-03-27 22:58MSE6-D2M-5000-CBUS-S-RG-BAR-VCB-AGD, MSE6-E2M-5000-FB13-AGD, MSE6-E2M-5000-FB37-AGD, etc. are all industrial control components.
Many products of festo have denial of service vulnerabilities, which can be exploited by attackers to gain control of the server.
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202503-2639",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "mse6-d2m-5000-cbus-s-rg-bar-vcb-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-e2m-5000-fb13-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-e2m-5000-fb37-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-e2m-5000-fb44-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-e2m-5000-fb43-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-e2m-5000-fb36-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb44-d-m-rg-bar-ami-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb43-d-m-rg-bar-m12l4-mq1-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb36-d-m-rg-bar-m12l4-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb43-d-m-rg-bar-m12l5-mq1-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb44-d-rg-bar-ami-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
},
{
"model": "mse6-c2m-5000-fb36-d-m-rg-bar-m12l5-agd",
"scope": null,
"trust": 0.6,
"vendor": "festo",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"cve": "CVE-2023-3634",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2025-05780",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "CNVD",
"id": "CNVD-2025-05780",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "MSE6-D2M-5000-CBUS-S-RG-BAR-VCB-AGD, MSE6-E2M-5000-FB13-AGD, MSE6-E2M-5000-FB37-AGD, etc. are all industrial control components.\n\nMany products of festo have denial of service vulnerabilities, which can be exploited by attackers to gain control of the server.",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
],
"trust": 0.6
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-3634",
"trust": 0.6
},
{
"db": "CNVD",
"id": "CNVD-2025-05780",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"id": "VAR-202503-2639",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
],
"trust": 0.06
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"last_update_date": "2025-03-27T22:58:15.934000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Many Fesco products have denial of service vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/671946"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-03-25T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2025-03-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2025-05780"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Many Fesco products have denial of service vulnerabilities",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2025-05780"
}
],
"trust": 0.6
}
}