Project Subscriptions
| Vendors | Products |
|---|---|
|
Abb
Subscribe
|
Ac500 Cpu Firmware
Subscribe
Pm5630-2eth
Subscribe
Pm5650-2eth
Subscribe
Pm5670-2eth
Subscribe
Pm5675-2eth
Subscribe
Pm571-eth-v14x
Subscribe
Pm571-v14x
Subscribe
Pm572
Subscribe
Pm573-eth
Subscribe
Pm581-eth-v14x
Subscribe
Pm581-v14x
Subscribe
Pm582
Subscribe
Pm582-arcnet
Subscribe
Pm582-eth
Subscribe
Pm582-v14x
Subscribe
Pm583-eth
Subscribe
Pm585-eth
Subscribe
Pm585-mc-kit
Subscribe
Pm590-arcnet-v14x
Subscribe
Pm590-eth
Subscribe
Pm590-eth-v14x
Subscribe
Pm590-mc-kit
Subscribe
Pm590-v14x
Subscribe
Pm591-2eth
Subscribe
Pm591-arcnet-v14x
Subscribe
Pm591-eth
Subscribe
Pm591-eth-v14x
Subscribe
Pm591-v14x
Subscribe
Pm592-eth
Subscribe
Pm595-4eth-f
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-42609 | Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipulation.This issue affects AC500 V2: from 2.0.0 before 2.8.6. |
Solution
No solution given by the vendor.
Workaround
Use the communication protocol "Tcp/Ip" instead of "ABB Tcp/Ip Level 2" (i.e. Port 1201 instead of 1200) for the connection between engineering software and PLC. This protocol/port is not affected by the DoS impact of the vulnerability.
Tue, 11 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: ABB
Published:
Updated: 2025-02-11T18:40:07.850Z
Reserved: 2022-09-13T05:57:45.421Z
Link: CVE-2022-3192
Updated: 2024-08-03T01:00:10.643Z
Status : Modified
Published: 2023-03-31T17:15:06.427
Modified: 2024-11-21T07:19:00.950
Link: CVE-2022-3192
No data.
OpenCVE Enrichment
No data.
EUVD