CVE-2022-29897

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated admin users on PHOENIX CONTACT RAD-ISM-900-EN devices to execute arbitrary code with root privileges via the traceroute utility in the WebUI. The improper input validation enables remote code execution on all firmware versions. Only devices with these specific industrial routers are affected.

💻 Affected Systems

Products:
  • PHOENIX CONTACT RAD-ISM-900-EN-* devices
Versions: All firmware versions
Operating Systems: Embedded OS on RAD-ISM-900 devices
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin user access to WebUI. All firmware versions before patching are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent backdoors, disrupt industrial operations, pivot to other network segments, or cause physical damage in industrial environments.

🟠

Likely Case

Attackers gain full control of affected devices to steal sensitive industrial data, disrupt network communications, or use devices as footholds for lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, admin access controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires admin credentials but is straightforward once authenticated. The vulnerability is in a standard utility with predictable exploitation paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2022-018/

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from PHOENIX CONTACT support portal. 3. Backup device configuration. 4. Apply firmware update via WebUI. 5. Restart device. 6. Verify update successful.

🔧 Temporary Workarounds

Disable WebUI Admin Access

all

Restrict or disable admin access to WebUI interface

Network Segmentation

all

Isolate RAD-ISM devices in separate VLAN with strict firewall rules

🧯 If You Can't Patch

  • Implement strict access controls limiting WebUI access to trusted admin users only
  • Deploy network monitoring to detect unusual traceroute activity or command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against vendor advisory. If device is RAD-ISM-900-EN-* with unpatched firmware, it is vulnerable.

Check Version:

Check WebUI system information page or use vendor-specific CLI commands

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory and test traceroute functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual traceroute commands in WebUI logs
  • Unexpected command execution events
  • Multiple failed admin login attempts

Network Indicators:

  • Unusual outbound connections from RAD-ISM devices
  • Traffic patterns indicating command and control activity

SIEM Query:

source="rad-ism-logs" AND (event="traceroute" OR event="command_execution")

🔗 References

📤 Share & Export