CVE-2022-28814: CWE-23 Relative Path Traversal in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device.
AI Analysis
Technical Summary
CVE-2022-28814 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The vulnerability is classified as a CWE-23 Relative Path Traversal flaw. This type of vulnerability allows an attacker to manipulate file paths in such a way that they can access files and directories outside the intended scope of the application. Specifically, an attacker can craft requests that traverse directories on the affected device's file system, enabling unauthorized reading of arbitrary files. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact of exploitation is severe, granting attackers full control over the device, which implies the ability to modify, delete, or execute files, potentially leading to complete system compromise. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and the critical impact make it a significant threat. The vulnerability affects version 8 of the UWP 3.0 product line, which is used for monitoring and controlling industrial and building automation systems, including car park management. Given the role of these devices in operational technology environments, exploitation could disrupt critical infrastructure operations or lead to unauthorized data disclosure and control.
Potential Impact
For European organizations, the exploitation of CVE-2022-28814 could have severe consequences. The affected devices are typically deployed in industrial automation, building management, and parking infrastructure, sectors that are integral to urban infrastructure and industrial operations across Europe. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of automated control systems, and potential physical safety risks if critical systems are manipulated. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal data is exposed, and reputational damage. Additionally, given the critical infrastructure nature of these systems, there is a risk of cascading effects impacting other connected systems. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks, especially in environments where these devices are accessible from less secure networks or the internet.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take immediate and specific actions beyond generic patching advice. First, they should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller devices, especially version 8, and CPY Car Park Server 2.8.3 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management stations only. Implement strict firewall rules to block unauthorized inbound traffic to these devices, particularly from untrusted external networks. Since no official patches are currently linked, organizations should contact Carlo Gavazzi for any available security updates or workarounds. In the interim, monitor device logs and network traffic for unusual file access patterns or unexpected commands indicative of exploitation attempts. Employ intrusion detection systems with custom signatures targeting path traversal attack patterns. Additionally, consider deploying application-layer gateways or reverse proxies that can sanitize and validate input paths to prevent traversal sequences. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment if exploitation occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Spain
CVE-2022-28814: CWE-23 Relative Path Traversal in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
Description
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device.
AI-Powered Analysis
Technical Analysis
CVE-2022-28814 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The vulnerability is classified as a CWE-23 Relative Path Traversal flaw. This type of vulnerability allows an attacker to manipulate file paths in such a way that they can access files and directories outside the intended scope of the application. Specifically, an attacker can craft requests that traverse directories on the affected device's file system, enabling unauthorized reading of arbitrary files. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact of exploitation is severe, granting attackers full control over the device, which implies the ability to modify, delete, or execute files, potentially leading to complete system compromise. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and the critical impact make it a significant threat. The vulnerability affects version 8 of the UWP 3.0 product line, which is used for monitoring and controlling industrial and building automation systems, including car park management. Given the role of these devices in operational technology environments, exploitation could disrupt critical infrastructure operations or lead to unauthorized data disclosure and control.
Potential Impact
For European organizations, the exploitation of CVE-2022-28814 could have severe consequences. The affected devices are typically deployed in industrial automation, building management, and parking infrastructure, sectors that are integral to urban infrastructure and industrial operations across Europe. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of automated control systems, and potential physical safety risks if critical systems are manipulated. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal data is exposed, and reputational damage. Additionally, given the critical infrastructure nature of these systems, there is a risk of cascading effects impacting other connected systems. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks, especially in environments where these devices are accessible from less secure networks or the internet.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take immediate and specific actions beyond generic patching advice. First, they should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller devices, especially version 8, and CPY Car Park Server 2.8.3 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management stations only. Implement strict firewall rules to block unauthorized inbound traffic to these devices, particularly from untrusted external networks. Since no official patches are currently linked, organizations should contact Carlo Gavazzi for any available security updates or workarounds. In the interim, monitor device logs and network traffic for unusual file access patterns or unexpected commands indicative of exploitation attempts. Employ intrusion detection systems with custom signatures targeting path traversal attack patterns. Additionally, consider deploying application-layer gateways or reverse proxies that can sanitize and validate input paths to prevent traversal sequences. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-04-08T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ceb104d7c5ea9f4b39d6d
Added to database: 5/20/2025, 8:50:24 PM
Last enriched: 7/6/2025, 6:11:32 AM
Last updated: 8/12/2025, 10:06:55 PM
Views: 13
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.