CVE-2022-3575: CWE-434 Unrestricted Upload of File with Dangerous Type in Frauscher Sensortechnik Diagnostic System FDS102
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
AI Analysis
Technical Summary
CVE-2022-3575 is a critical vulnerability affecting Frauscher Sensortechnik GmbH's Diagnostic System FDS102, specifically versions 2.8.0 through 2.9.1. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue lies in the configuration upload function of the FDS102 device, which allows an unauthenticated attacker to upload malicious code. This lack of authentication combined with unrestricted file upload means that an attacker can remotely and anonymously upload arbitrary files, potentially containing malicious payloads, to the device. Once uploaded, this malicious code can be executed, leading to a complete compromise of the FDS102 device. The CVSS v3.1 score of 9.8 (critical) reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects a specialized diagnostic system used in railway infrastructure monitoring and control, which is critical for operational safety and reliability. No patches were listed in the provided information, and no known exploits in the wild have been reported as of the publication date. However, the potential for severe impact remains significant given the nature of the device and the ease of exploitation.
Potential Impact
For European organizations, particularly those involved in railway infrastructure and transportation systems, this vulnerability poses a severe risk. The FDS102 system is used for diagnostic purposes in railway signaling and control, which are critical for safe and efficient train operations. A successful exploitation could lead to unauthorized control or disruption of diagnostic functions, potentially causing operational failures, safety incidents, or service outages. The compromise of such devices could also serve as a foothold for attackers to pivot into broader operational technology (OT) networks, threatening the integrity and availability of railway control systems. Given the critical role of rail transport in Europe’s economy and mobility, any disruption could have cascading effects on supply chains, commuter safety, and national security. Furthermore, the lack of authentication in the upload function increases the risk of remote exploitation by threat actors, including nation-state or cybercriminal groups targeting critical infrastructure.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the FDS102 devices by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Organizations should monitor network traffic for unusual upload activities targeting the configuration upload function. Since no patches were listed, contacting Frauscher Sensortechnik for updated firmware or security advisories is critical. If possible, disable or restrict the configuration upload feature until a secure patch is available. Employ intrusion detection systems (IDS) tailored for OT environments to detect anomalous behavior on these devices. Additionally, implement strict access control policies and ensure that management interfaces are not exposed to the internet or untrusted networks. Regularly audit device configurations and logs for signs of unauthorized access or file uploads. Finally, develop and test incident response plans specific to OT environments to quickly contain and remediate any compromise.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Austria, Switzerland, Poland
CVE-2022-3575: CWE-434 Unrestricted Upload of File with Dangerous Type in Frauscher Sensortechnik Diagnostic System FDS102
Description
Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.
AI-Powered Analysis
Technical Analysis
CVE-2022-3575 is a critical vulnerability affecting Frauscher Sensortechnik GmbH's Diagnostic System FDS102, specifically versions 2.8.0 through 2.9.1. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue lies in the configuration upload function of the FDS102 device, which allows an unauthenticated attacker to upload malicious code. This lack of authentication combined with unrestricted file upload means that an attacker can remotely and anonymously upload arbitrary files, potentially containing malicious payloads, to the device. Once uploaded, this malicious code can be executed, leading to a complete compromise of the FDS102 device. The CVSS v3.1 score of 9.8 (critical) reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects a specialized diagnostic system used in railway infrastructure monitoring and control, which is critical for operational safety and reliability. No patches were listed in the provided information, and no known exploits in the wild have been reported as of the publication date. However, the potential for severe impact remains significant given the nature of the device and the ease of exploitation.
Potential Impact
For European organizations, particularly those involved in railway infrastructure and transportation systems, this vulnerability poses a severe risk. The FDS102 system is used for diagnostic purposes in railway signaling and control, which are critical for safe and efficient train operations. A successful exploitation could lead to unauthorized control or disruption of diagnostic functions, potentially causing operational failures, safety incidents, or service outages. The compromise of such devices could also serve as a foothold for attackers to pivot into broader operational technology (OT) networks, threatening the integrity and availability of railway control systems. Given the critical role of rail transport in Europe’s economy and mobility, any disruption could have cascading effects on supply chains, commuter safety, and national security. Furthermore, the lack of authentication in the upload function increases the risk of remote exploitation by threat actors, including nation-state or cybercriminal groups targeting critical infrastructure.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the FDS102 devices by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Organizations should monitor network traffic for unusual upload activities targeting the configuration upload function. Since no patches were listed, contacting Frauscher Sensortechnik for updated firmware or security advisories is critical. If possible, disable or restrict the configuration upload feature until a secure patch is available. Employ intrusion detection systems (IDS) tailored for OT environments to detect anomalous behavior on these devices. Additionally, implement strict access control policies and ensure that management interfaces are not exposed to the internet or untrusted networks. Regularly audit device configurations and logs for signs of unauthorized access or file uploads. Finally, develop and test incident response plans specific to OT environments to quickly contain and remediate any compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2022-10-18T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981fc4522896dcbdcb44
Added to database: 5/21/2025, 9:08:47 AM
Last enriched: 7/5/2025, 10:25:01 PM
Last updated: 2/7/2026, 8:21:58 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumCVE-2026-2107: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.