{"vulnerability": "cve-2022-4048", "sightings": [{"uuid": "746b84fb-a836-4107-b836-39dab1a06566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4048", "type": "seen", "source": "https://t.me/cibsecurity/64102", "content": "\u203c CVE-2022-4048 \u203c\n\nInadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate code of the encrypted boot application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-15T14:29:50.000000Z"}, {"uuid": "588dd11b-72ed-4de7-b1a1-bec063a412c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40485", "type": "seen", "source": "https://t.me/cibsecurity/50490", "content": "\u203c CVE-2022-40485 \u203c\n\nWedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /package_detail.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T18:36:28.000000Z"}, {"uuid": "fe07ccf2-34c4-42b4-b004-76b1024b30e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40484", "type": "seen", "source": "https://t.me/cibsecurity/50495", "content": "\u203c CVE-2022-40484 \u203c\n\nWedding Planner v1.0 was discovered to contain a SQL injection vulnerability via the booking parameter at /admin/client_edit.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-26T18:36:35.000000Z"}, {"uuid": "9ee532c1-22ba-4a35-bc96-33daa5452eb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4048", "type": "seen", "source": "https://t.me/ics_cert/664", "content": "\u0647\u0634\u062f\u0627\u0631 \u06a9\u0634\u0641 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0635\u0646\u0639\u062a\u06cc \n\n\u0645\u062d\u0642\u0642\u0627\u0646 \u062c\u0632\u0626\u06cc\u0627\u062a \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u062c\u062f\u06cc\u062f\u06cc \u0631\u0627 \u0641\u0627\u0634 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0628\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0641\u0646\u0627\u0648\u0631\u06cc \u0639\u0645\u0644\u06cc\u0627\u062a\u06cc (OT) CODESYS \u0648 Festo \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u06a9\u062f \u0645\u0646\u0628\u0639 \u0648 \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 (DoS) \u0634\u0648\u062f.\n\n\u0645\u062a\u062e\u0635\u0635\u0627\u0646 Forescout Vedere Labs \u062f\u0631 \u0645\u0648\u0631\u062f \u0645\u0634\u06a9\u0644\u0627\u062a \u0622\u0646 \u0635\u062d\u0628\u062a \u06a9\u0631\u062f\u0646\u062f \u06a9\u0647 \u06cc\u06a9 \u0648\u0627\u06af\u0646 \u0648 \u06cc\u06a9 \u0648\u0627\u06af\u0646 \u06a9\u0648\u0686\u06a9\u060c \u0648 \u0628\u0627 \u0633\u0647\u0645 \u0634\u06cc\u0631 \u0627\u0632 \u0627\u0646\u062a\u0642\u0627\u062f \u0627\u0632 \u062a\u0627\u0645\u06cc\u0646 \u06a9\u0646\u0646\u062f\u06af\u0627\u0646.\n\n\u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u06af\u0641\u062a\u0646\u062f \u06a9\u0647 \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644\u0627\u062a \u06cc\u0627 \u06cc\u06a9 \u0631\u0648\u06cc\u06a9\u0631\u062f \u0646\u0627\u0627\u0645\u0646 \u062f\u0631 \u0637\u0631\u0627\u062d\u06cc \u0645\u062d\u0635\u0648\u0644 \u0631\u0627 \u0646\u0634\u0627\u0646 \u0645\u06cc \u062f\u0647\u062f\u060c \u0632\u0645\u0627\u0646\u06cc \u06a9\u0647 \u062a\u0648\u0644\u06cc\u062f \u06a9\u0646\u0646\u062f\u06af\u0627\u0646 \u0639\u0645\u0644\u06a9\u0631\u062f\u0647\u0627\u06cc \u062e\u0637\u0631\u0646\u0627\u06a9\u06cc \u0631\u0627 \u06a9\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646 \u0628\u062f\u0648\u0646 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0628\u0647 \u0622\u0646\u0647\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0627\u0634\u062a\u060c \u06cc\u0627 \u0627\u062c\u0631\u0627\u06cc \u0636\u0639\u06cc\u0641 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0631\u0627 \u0646\u0634\u0627\u0646 \u0645\u06cc \u062f\u0647\u062f.\n\n\u0645\u0647\u0645\u200c\u062a\u0631\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-2022-3270 (\u0627\u0645\u062a\u06cc\u0627\u0632 CVSS: 9.8) \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 Festo \u06a9\u0647 \u0627\u0632 \u067e\u0631\u0648\u062a\u06a9\u0644 Festo Generic Multicast (FGMC) \u0628\u0631\u0627\u06cc \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0645\u062c\u062f\u062f \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627 \u0628\u062f\u0648\u0646 \u0647\u06cc\u0686\u200c\u06af\u0648\u0646\u0647 \u0627\u062d\u0631\u0627\u0632 \u0647\u0648\u06cc\u062a \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u062f \u0648 \u0627\u062c\u0627\u0632\u0647 \u0627\u0646\u06a9\u0627\u0631 \u0633\u0631\u0648\u06cc\u0633 \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n\u06cc\u06a9\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0632 \u0646\u0642\u0635 \u0647\u0627\u06cc DoS \u0646\u06cc\u0632 \u0628\u0631 \u06a9\u0646\u062a\u0631\u0644 \u06a9\u0646\u0646\u062f\u0647 \u0647\u0627\u06cc Festo \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc \u06af\u0630\u0627\u0631\u062f (CVE-2022-3079\u060c \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS: 7.5) \u0648 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u063a\u06cc\u0631\u0645\u062c\u0627\u0632 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0647 \u06cc\u06a9 \u0635\u0641\u062d\u0647 \u0648\u0628 \u063a\u06cc\u0631\u0645\u0633\u062a\u0646\u062f (\"cec-reboot.php\") \u0627\u0633\u062a \u06a9\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u062a\u0648\u0633\u0637 \u06cc\u06a9 \u06a9\u0627\u0631\u0628\u0631 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0634\u0648\u062f. \u0645\u0647\u0627\u062c\u0645 \u0628\u0631\u0627\u06cc \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 PLC \u0647\u0627\u06cc Festo CPX-CEC-C1 \u0648 CPX-CMXX \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0634\u0628\u06a9\u0647.\n\n\u0633\u0648\u0645\u06cc\u0646 \u0645\u0633\u0626\u0644\u0647 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u0636\u0639\u06cc\u0641 \u062f\u0631 \u0632\u0645\u0627\u0646 \u0627\u062c\u0631\u0627 CODESYS V3 \u0628\u0631\u0627\u06cc \u0645\u062d\u0627\u0641\u0638\u062a \u0627\u0632 \u0628\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u0648 \u0628\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u06a9\u062f \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u0633\u062a.\n\n\u0627\u06cc\u0646 \u0627\u0634\u06a9\u0627\u0644 \u0634\u0646\u0627\u0633\u0647 CVE-2022-4048 \u0648 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS 7.7 \u0631\u0627 \u062f\u0631\u06cc\u0627\u0641\u062a \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0628\u0627\u0644\u0642\u0648\u0647 \u0627\u062c\u0627\u0632\u0647 \u0631\u0645\u0632\u06af\u0634\u0627\u06cc\u06cc \u0648 \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u06a9\u062f \u0645\u0646\u0628\u0639 \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f\u060c \u062f\u0631 \u0646\u062a\u06cc\u062c\u0647 \u0645\u062d\u0631\u0645\u0627\u0646\u0647 \u0628\u0648\u062f\u0646 \u0648 \u062d\u0641\u0627\u0638\u062a \u0627\u0632 \u06cc\u06a9\u067e\u0627\u0631\u0686\u06af\u06cc \u0631\u0627 \u062a\u0636\u0639\u06cc\u0641 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\nForescout \u0628\u06cc\u0627\u0646 \u06a9\u0631\u062f \u06a9\u0647 \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0648 \u0628\u0627\u06af CODESYS \u0631\u0627 \u067e\u06cc\u062f\u0627 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631 \u06a9\u0646\u062a\u0631\u0644\u200c\u06a9\u0646\u0646\u062f\u0647\u200c\u0647\u0627\u06cc Festo CPX-CEC-C1 (CVE-2022-31806 \u0648 CVE-2022-22515) \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u0646\u062f \u06a9\u0647 \u0628\u0647 \u067e\u06cc\u06a9\u0631\u0628\u0646\u062f\u06cc \u0646\u0627\u0627\u0645\u0646 \u062f\u0631 \u0632\u0645\u0627\u0646 \u0627\u062c\u0631\u0627 Control \u0645\u0631\u0628\u0648\u0637 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f\u060c \u06a9\u0647 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062e\u0631\u0627\u0628\u06cc \u0634\u0648\u062f.\n\n\u0628\u0631\u0627\u06cc \u06a9\u0627\u0647\u0634 \u062a\u0647\u062f\u06cc\u062f\u0627\u062a \u0628\u0627\u0644\u0642\u0648\u0647\u060c \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627 \u062a\u0634\u0648\u06cc\u0642 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0631\u0627 \u0631\u0641\u0639 \u0645\u0634\u06a9\u0644 \u06a9\u0646\u0646\u062f \u0648 \u0642\u0648\u0627\u0646\u06cc\u0646 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0634\u0628\u06a9\u0647 \u0648 \u0628\u062e\u0634\u200c\u0628\u0646\u062f\u06cc \u0645\u0646\u0627\u0633\u0628 \u0631\u0627 \u062a\u0646\u0638\u06cc\u0645 \u06a9\u0646\u0646\u062f \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u062a\u0631\u0627\u0641\u06cc\u06a9 \u0634\u0628\u06a9\u0647 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0641\u0639\u0627\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u063a\u06cc\u0631\u0639\u0627\u062f\u06cc \u0646\u0638\u0627\u0631\u062a \u06a9\u0646\u0646\u062f.\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2022-12-01T20:15:38.000000Z"}, {"uuid": "441ec1b0-bd63-42b8-8a93-8c15cfcca2e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4048", "type": "seen", "source": "https://t.me/true_secator/3768", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e \u043d\u043e\u0432\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 (OT) \u043e\u0442 CODESYS \u0438 Festo, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0434\u0434\u0435\u043b\u043a\u0435 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (DoS).\n\n\u041e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u0445, \u043a\u043e\u0438\u0445 \u0432\u0430\u0433\u043e\u043d \u0438 \u043c\u0430\u043b\u0435\u043d\u044c\u043a\u0430\u044f \u0442\u0435\u043b\u0435\u0436\u043a\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b Forescout Vedere Labs, \u043f\u0440\u0438\u0447\u0435\u043c \u0441 \u043b\u044c\u0432\u0438\u043d\u043e\u0439 \u0434\u043e\u043b\u0435\u0439 \u043a\u0440\u0438\u0442\u0438\u043a\u0438 \u0432 \u0430\u0434\u0440\u0435\u0441 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0437\u0430\u044f\u0432\u0438\u043b\u0438, \u0447\u0442\u043e \u044d\u0442\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0438\u043b\u043b\u044e\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0442 \u043b\u0438\u0431\u043e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439 \u043f\u043e\u0434\u0445\u043e\u0434 \u043a \u043f\u0440\u043e\u0435\u043a\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043b\u0438\u0431\u043e \u043d\u0435\u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f CVE-2022-3270 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9,8), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u044b \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0430\u0446\u0438\u0438 Festo, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b Festo Generic Multicast (FGMC) \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0431\u0435\u0437 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u0437\u044b\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438.\n\n\u0414\u0440\u0443\u0433\u043e\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a DoS \u0442\u0430\u043a\u0436\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u043e\u0432 Festo (CVE-2022-3079, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 7,5) \u0438 \u0441\u0432\u044f\u0437\u0430\u043d \u0441\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043d\u0435\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 (\u00abcec-reboot.php\u00bb), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u041f\u041b\u041a Festo CPX-CEC-C1 \u0438 CPX-CMXX \u0447\u0435\u0440\u0435\u0437 \u0441\u0435\u0442\u044c.\n\n\u0422\u0440\u0435\u0442\u044c\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u043b\u0430\u0431\u043e\u0439 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0438 \u0432 \u0441\u0440\u0435\u0434\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f CODESYS V3 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043a\u043e\u0434\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2022-4048 \u0438 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS: 7,7 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u044b\u0432\u0430\u0442\u044c \u0438 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u0442\u0435\u043c \u0441\u0430\u043c\u044b\u043c \u043f\u043e\u0434\u0440\u044b\u0432\u0430\u044f \u0437\u0430\u0449\u0438\u0442\u0443 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438.\n\nForescout \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0434\u0432\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CODESYS, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0435 \u043d\u0430 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u044b Festo CPX-CEC-C1 (CVE-2022-31806 \u0438 CVE-2022-22515), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0435\u0439 \u0432 \u0441\u0440\u0435\u0434\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f Control, \u0447\u0442\u043e \u0442\u0430\u043a\u0436\u0435 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043e\u0442\u043a\u0430\u0437\u0443.\n\n\u0414\u0430\u0431\u044b \u0443\u043c\u0435\u043d\u044c\u0448\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0433\u0440\u043e\u0437\u044b, \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0438\u043d\u0432\u0435\u043d\u0442\u0430\u0440\u0438\u0437\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0438\u0442\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0442\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0430\u043d\u043e\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438.", "creation_timestamp": "2022-12-01T09:11:42.000000Z"}, {"uuid": "70f1296f-2c47-402c-9ac4-78266ab236b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40489", "type": "seen", "source": "https://t.me/cibsecurity/53752", "content": "\u203c CVE-2022-40489 \u203c\n\nThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-01T07:30:42.000000Z"}, {"uuid": "d935e95b-2827-467b-afba-fafcf73d351c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2022-4048", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "7c762efb-f3e0-4ae3-b06b-34303e533dcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-4048", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2820", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-4048\n\ud83d\udd39 Description: Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate code of the encrypted boot application.\n\ud83d\udccf Published: 2023-05-15T09:23:18.977Z\n\ud83d\udccf Modified: 2025-01-23T19:25:03.004Z\n\ud83d\udd17 References:\n1. https://customers.codesys.com/index.php?eID=dumpFile&amp;t=f&amp;f=17350&amp;token=2cee62285d3ec76d6a78dfa9b9e81e66f6136a2a&amp;download=", "creation_timestamp": "2025-01-23T20:03:42.000000Z"}, {"uuid": "5f5c6c98-9309-4d4a-8446-adf8707bef26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40489", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/13355", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2022-40489\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: ThinkCMF version 6.0.7 is affected by a Cross Site Request Forgery (CSRF) vulnerability that allows a Super Administrator user to be injected into administrative users.\n\ud83d\udccf Published: 2022-12-01T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-24T20:24:55.671Z\n\ud83d\udd17 References:\n1. https://github.com/thinkcmf/thinkcmf/issues/736", "creation_timestamp": "2025-04-24T21:07:26.000000Z"}, {"uuid": "46428dbb-6d32-42f2-a570-edd0f85f87af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40482", "type": "seen", "source": "Telegram/7EjgEJFkCigu3E3qxdvX-GPZjONqLDE9BgGHEHWIxxLd6dQS", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "72b96072-093d-4b90-97a3-0841530ffff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40480", "type": "seen", "source": "https://t.me/cibsecurity/57738", "content": "\u203c CVE-2022-40480 \u203c\n\nNordic Semiconductor, Microchip Technology NRF5340-DK DT100112 was discovered to contain an issue which allows attackers to cause a Denial of Service (DoS) via a crafted ConReq packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-08T02:23:43.000000Z"}, {"uuid": "361de513-93eb-456b-a034-7ffd949ffe69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-40486", "type": "seen", "source": "https://t.me/cibsecurity/50575", "content": "\u203c CVE-2022-40486 \u203c\n\nTP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-09-28T16:34:07.000000Z"}]}