Skip to main content

CVE-2022-3575: CWE-434 Unrestricted Upload of File with Dangerous Type in Frauscher Sensortechnik Diagnostic System FDS102

Critical
VulnerabilityCVE-2022-3575cvecve-2022-3575cwe-434
Published: Wed Nov 02 2022 (11/02/2022, 16:15:33 UTC)
Source: CVE
Vendor/Project: Frauscher Sensortechnik
Product: Diagnostic System FDS102

Description

Frauscher Sensortechnik GmbH FDS102 for FAdC R2 and FAdCi R2 v2.8.0 to v2.9.1 are vulnerable to malicious code upload without authentication by using the configuration upload function. This could lead to a complete compromise of the FDS102 device.

AI-Powered Analysis

AILast updated: 07/05/2025, 22:25:01 UTC

Technical Analysis

CVE-2022-3575 is a critical vulnerability affecting Frauscher Sensortechnik GmbH's Diagnostic System FDS102, specifically versions 2.8.0 through 2.9.1. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. The core issue lies in the configuration upload function of the FDS102 device, which allows an unauthenticated attacker to upload malicious code. This lack of authentication combined with unrestricted file upload means that an attacker can remotely and anonymously upload arbitrary files, potentially containing malicious payloads, to the device. Once uploaded, this malicious code can be executed, leading to a complete compromise of the FDS102 device. The CVSS v3.1 score of 9.8 (critical) reflects the high severity, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects a specialized diagnostic system used in railway infrastructure monitoring and control, which is critical for operational safety and reliability. No patches were listed in the provided information, and no known exploits in the wild have been reported as of the publication date. However, the potential for severe impact remains significant given the nature of the device and the ease of exploitation.

Potential Impact

For European organizations, particularly those involved in railway infrastructure and transportation systems, this vulnerability poses a severe risk. The FDS102 system is used for diagnostic purposes in railway signaling and control, which are critical for safe and efficient train operations. A successful exploitation could lead to unauthorized control or disruption of diagnostic functions, potentially causing operational failures, safety incidents, or service outages. The compromise of such devices could also serve as a foothold for attackers to pivot into broader operational technology (OT) networks, threatening the integrity and availability of railway control systems. Given the critical role of rail transport in Europe’s economy and mobility, any disruption could have cascading effects on supply chains, commuter safety, and national security. Furthermore, the lack of authentication in the upload function increases the risk of remote exploitation by threat actors, including nation-state or cybercriminal groups targeting critical infrastructure.

Mitigation Recommendations

Immediate mitigation should focus on restricting access to the FDS102 devices by implementing network segmentation and firewall rules to limit exposure to trusted management networks only. Organizations should monitor network traffic for unusual upload activities targeting the configuration upload function. Since no patches were listed, contacting Frauscher Sensortechnik for updated firmware or security advisories is critical. If possible, disable or restrict the configuration upload feature until a secure patch is available. Employ intrusion detection systems (IDS) tailored for OT environments to detect anomalous behavior on these devices. Additionally, implement strict access control policies and ensure that management interfaces are not exposed to the internet or untrusted networks. Regularly audit device configurations and logs for signs of unauthorized access or file uploads. Finally, develop and test incident response plans specific to OT environments to quickly contain and remediate any compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2022-10-18T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdcb44

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/5/2025, 10:25:01 PM

Last updated: 8/11/2025, 9:38:11 PM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats