CVE-2022-28814: CWE-23 Relative Path Traversal in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device.
AI Analysis
Technical Summary
CVE-2022-28814 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The vulnerability is classified as a CWE-23 Relative Path Traversal flaw. This type of vulnerability allows an attacker to manipulate file paths in such a way that they can access files and directories outside the intended scope of the application. Specifically, an attacker can craft requests that traverse directories on the affected device's file system, enabling unauthorized reading of arbitrary files. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact of exploitation is severe, granting attackers full control over the device, which implies the ability to modify, delete, or execute files, potentially leading to complete system compromise. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and the critical impact make it a significant threat. The vulnerability affects version 8 of the UWP 3.0 product line, which is used for monitoring and controlling industrial and building automation systems, including car park management. Given the role of these devices in operational technology environments, exploitation could disrupt critical infrastructure operations or lead to unauthorized data disclosure and control.
Potential Impact
For European organizations, the exploitation of CVE-2022-28814 could have severe consequences. The affected devices are typically deployed in industrial automation, building management, and parking infrastructure, sectors that are integral to urban infrastructure and industrial operations across Europe. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of automated control systems, and potential physical safety risks if critical systems are manipulated. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal data is exposed, and reputational damage. Additionally, given the critical infrastructure nature of these systems, there is a risk of cascading effects impacting other connected systems. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks, especially in environments where these devices are accessible from less secure networks or the internet.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take immediate and specific actions beyond generic patching advice. First, they should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller devices, especially version 8, and CPY Car Park Server 2.8.3 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management stations only. Implement strict firewall rules to block unauthorized inbound traffic to these devices, particularly from untrusted external networks. Since no official patches are currently linked, organizations should contact Carlo Gavazzi for any available security updates or workarounds. In the interim, monitor device logs and network traffic for unusual file access patterns or unexpected commands indicative of exploitation attempts. Employ intrusion detection systems with custom signatures targeting path traversal attack patterns. Additionally, consider deploying application-layer gateways or reverse proxies that can sanitize and validate input paths to prevent traversal sequences. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment if exploitation occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Spain
CVE-2022-28814: CWE-23 Relative Path Traversal in Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller
Description
Carlo Gavazzi UWP3.0 in multiple versions and CPY Car Park Server in Version 2.8.3 was discovered to be vulnerable to a relative path traversal vulnerability which enables remote attackers to read arbitrary files and gain full control of the device.
AI-Powered Analysis
Technical Analysis
CVE-2022-28814 is a critical security vulnerability identified in Carlo Gavazzi's UWP 3.0 Monitoring Gateway and Controller, as well as the CPY Car Park Server version 2.8.3. The vulnerability is classified as a CWE-23 Relative Path Traversal flaw. This type of vulnerability allows an attacker to manipulate file paths in such a way that they can access files and directories outside the intended scope of the application. Specifically, an attacker can craft requests that traverse directories on the affected device's file system, enabling unauthorized reading of arbitrary files. The vulnerability is remotely exploitable without requiring authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact of exploitation is severe, granting attackers full control over the device, which implies the ability to modify, delete, or execute files, potentially leading to complete system compromise. The CVSS v3.1 base score of 9.8 reflects the critical nature of this vulnerability, with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the ease of exploitation and the critical impact make it a significant threat. The vulnerability affects version 8 of the UWP 3.0 product line, which is used for monitoring and controlling industrial and building automation systems, including car park management. Given the role of these devices in operational technology environments, exploitation could disrupt critical infrastructure operations or lead to unauthorized data disclosure and control.
Potential Impact
For European organizations, the exploitation of CVE-2022-28814 could have severe consequences. The affected devices are typically deployed in industrial automation, building management, and parking infrastructure, sectors that are integral to urban infrastructure and industrial operations across Europe. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of automated control systems, and potential physical safety risks if critical systems are manipulated. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal data is exposed, and reputational damage. Additionally, given the critical infrastructure nature of these systems, there is a risk of cascading effects impacting other connected systems. The lack of authentication requirement and remote exploitability increase the risk of widespread attacks, especially in environments where these devices are accessible from less secure networks or the internet.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should take immediate and specific actions beyond generic patching advice. First, they should identify all instances of Carlo Gavazzi UWP 3.0 Monitoring Gateway and Controller devices, especially version 8, and CPY Car Park Server 2.8.3 within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management stations only. Implement strict firewall rules to block unauthorized inbound traffic to these devices, particularly from untrusted external networks. Since no official patches are currently linked, organizations should contact Carlo Gavazzi for any available security updates or workarounds. In the interim, monitor device logs and network traffic for unusual file access patterns or unexpected commands indicative of exploitation attempts. Employ intrusion detection systems with custom signatures targeting path traversal attack patterns. Additionally, consider deploying application-layer gateways or reverse proxies that can sanitize and validate input paths to prevent traversal sequences. Finally, develop and test incident response plans specific to industrial control system compromises to ensure rapid containment if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-04-08T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682ceb104d7c5ea9f4b39d6d
Added to database: 5/20/2025, 8:50:24 PM
Last enriched: 7/6/2025, 6:11:32 AM
Last updated: 2/4/2026, 4:17:17 PM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24735: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in Apache Software Foundation Apache Answer
HighCVE-2026-22549: CWE-250: Execution with Unnecessary Privileges in F5 F5 BIG-IP Container Ingress Services
MediumCVE-2025-70545: n/a
HighCVE-2026-0873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ercom Cryptobox
MediumCVE-2026-22548: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in F5 BIG-IP
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.