Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to several modules and services of the software. This could allow an attacker to delete arbitrary files and cause a denial-of-service condition.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-50659 Sewio’s Real-Time Location System (RTLS) Studio version 2.0.0 up to and including version 2.6.2 is vulnerable to improper input validation of user input to several modules and services of the software. This could allow an attacker to delete arbitrary files and cause a denial-of-service condition.
Fixes

Solution

Sewio has provided the following updates and recommends that users update to the latest version: * RTLS Studio: Update to version 3.0.0 or later https://portal.sewio.net/login  (requires login)


Workaround

Sewio also recommends the following workarounds to reduce the risk of exploitation: * Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the internet https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01 . * Locate control system networks and remote devices behind firewalls and isolate them from business networks.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:59:31.477Z

Reserved: 2022-12-21T18:52:32.321Z

Link: CVE-2022-47917

cve-icon Vulnrichment

Updated: 2024-08-03T15:02:36.550Z

cve-icon NVD

Status : Modified

Published: 2023-01-18T01:15:13.147

Modified: 2024-11-21T07:32:31.657

Link: CVE-2022-47917

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.