CVE-2022-3575: CWE-434 Unrestricted Upload of File with Dangerous Type in Frauscher Sensortechnik Diagnostic System FDS102
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
AI Analysis
Technical Summary
CVE-2022-3575 is a critical vulnerability affecting Frauscher Sensortechnik GmbH's Diagnostic System FDS102, specifically versions 2.8.0 through 2.9.1. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue lies in the configuration upload function of the FDS102 device, which allows an unauthenticated attacker to upload malicious code. This lack of authentication combined with unrestricted file upload means that an attacker can remotely and anonymously upload arbitrary files, potentially containing malicious payloads, to the device. Once uploaded, this malicious code can be executed, leading to a complete compromise of the FDS102 device. The CVSS v3.1 score of 9.8 (critical) reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects a specialized diagnostic system used in railway infrastructure monitoring and control, which is critical for operational safety and reliability. No patches were listed in the provided information, and no known exploits in the wild have been reported as of the publication date. However, the potential for severe impact remains significant given the nature of the device and the ease of exploitation.
Potential Impact
For European organizations, particularly those involved in railway infrastructure and transportation systems, this vulnerability poses a severe risk. The FDS102 system is used for diagnostic purposes in railway signaling and control, which are critical for safe and efficient train operations. A successful exploitation could lead to unauthorized control or disruption of diagnostic functions, potentially causing operational failures, safety incidents, or service outages. The compromise of such devices could also serve as a foothold for attackers to pivot into broader operational technology (OT) networks, threatening the integrity and availability of railway control systems. Given the critical role of rail transport in Europe’s economy and mobility, any disruption could have cascading effects on supply chains, commuter safety, and national security. Furthermore, the lack of authentication in the upload function increases the risk of remote exploitation by threat actors, including nation-state or cybercriminal groups targeting critical infrastructure.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the FDS102 devices by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Organizations should monitor network traffic for unusual upload activities targeting the configuration upload function. Since no patches were listed, contacting Frauscher Sensortechnik for updated firmware or security advisories is critical. If possible, disable or restrict the configuration upload feature until a secure patch is available. Employ intrusion detection systems (IDS) tailored for OT environments to detect anomalous behavior on these devices. Additionally, implement strict access control policies and ensure that management interfaces are not exposed to the internet or untrusted networks. Regularly audit device configurations and logs for signs of unauthorized access or file uploads. Finally, develop and test incident response plans specific to OT environments to quickly contain and remediate any compromise.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Austria, Switzerland, Poland
CVE-2022-3575: CWE-434 Unrestricted Upload of File with Dangerous Type in Frauscher Sensortechnik Diagnostic System FDS102
Description
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
AI-Powered Analysis
Technical Analysis
CVE-2022-3575 is a critical vulnerability affecting Frauscher Sensortechnik GmbH's Diagnostic System FDS102, specifically versions 2.8.0 through 2.9.1. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue lies in the configuration upload function of the FDS102 device, which allows an unauthenticated attacker to upload malicious code. This lack of authentication combined with unrestricted file upload means that an attacker can remotely and anonymously upload arbitrary files, potentially containing malicious payloads, to the device. Once uploaded, this malicious code can be executed, leading to a complete compromise of the FDS102 device. The CVSS v3.1 score of 9.8 (critical) reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects a specialized diagnostic system used in railway infrastructure monitoring and control, which is critical for operational safety and reliability. No patches were listed in the provided information, and no known exploits in the wild have been reported as of the publication date. However, the potential for severe impact remains significant given the nature of the device and the ease of exploitation.
Potential Impact
For European organizations, particularly those involved in railway infrastructure and transportation systems, this vulnerability poses a severe risk. The FDS102 system is used for diagnostic purposes in railway signaling and control, which are critical for safe and efficient train operations. A successful exploitation could lead to unauthorized control or disruption of diagnostic functions, potentially causing operational failures, safety incidents, or service outages. The compromise of such devices could also serve as a foothold for attackers to pivot into broader operational technology (OT) networks, threatening the integrity and availability of railway control systems. Given the critical role of rail transport in Europe’s economy and mobility, any disruption could have cascading effects on supply chains, commuter safety, and national security. Furthermore, the lack of authentication in the upload function increases the risk of remote exploitation by threat actors, including nation-state or cybercriminal groups targeting critical infrastructure.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the FDS102 devices by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Organizations should monitor network traffic for unusual upload activities targeting the configuration upload function. Since no patches were listed, contacting Frauscher Sensortechnik for updated firmware or security advisories is critical. If possible, disable or restrict the configuration upload feature until a secure patch is available. Employ intrusion detection systems (IDS) tailored for OT environments to detect anomalous behavior on these devices. Additionally, implement strict access control policies and ensure that management interfaces are not exposed to the internet or untrusted networks. Regularly audit device configurations and logs for signs of unauthorized access or file uploads. Finally, develop and test incident response plans specific to OT environments to quickly contain and remediate any compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcb44
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:25:01 PM
Last updated: 8/11/2025, 9:38:11 PM
Views: 17
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.