Vulnerability Details CVE-2022-3192
Improper Input Validation vulnerability in ABB AC500 V2 PM5xx allows Client-Server Protocol Manipulation.This issue affects AC500 V2: from 2.0.0 before 2.8.6.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 18.7%
CVSS Severity
CVSS v3 Score 5.3
Products affected by CVE-2022-3192
-
cpe:2.3:h:abb:pm5630-2eth:2.0
-
cpe:2.3:h:abb:pm5650-2eth:2.0
-
cpe:2.3:h:abb:pm5670-2eth:2.0
-
cpe:2.3:h:abb:pm5675-2eth:2.0
-
cpe:2.3:h:abb:pm571-eth-v14x:2.0
-
cpe:2.3:h:abb:pm571-v14x:2.0
-
-
cpe:2.3:h:abb:pm573-eth:2.0
-
cpe:2.3:h:abb:pm581-eth-v14x:2.0
-
cpe:2.3:h:abb:pm581-v14x:2.0
-
cpe:2.3:h:abb:pm582-arcnet:2.0
-
cpe:2.3:h:abb:pm582-eth:2.0
-
cpe:2.3:h:abb:pm582-v14x:2.0
-
-
cpe:2.3:h:abb:pm583-eth:2.0
-
cpe:2.3:h:abb:pm585-eth:2.0
-
cpe:2.3:h:abb:pm585-mc-kit:2.0
-
cpe:2.3:h:abb:pm590-arcnet-v14x:2.0
-
cpe:2.3:h:abb:pm590-eth-v14x:2.0
-
cpe:2.3:h:abb:pm590-eth:2.0
-
cpe:2.3:h:abb:pm590-mc-kit:2.0
-
cpe:2.3:h:abb:pm590-v14x:2.0
-
cpe:2.3:h:abb:pm591-2eth:2.0
-
cpe:2.3:h:abb:pm591-arcnet-v14x:2.0
-
cpe:2.3:h:abb:pm591-eth-v14x:2.0
-
cpe:2.3:h:abb:pm591-eth:2.0
-
cpe:2.3:h:abb:pm591-v14x:2.0
-
cpe:2.3:h:abb:pm592-eth:2.0
-
cpe:2.3:h:abb:pm595-4eth-f:2.0
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.0.0
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.3.2
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.4.2
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.4.4
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.5.2
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.5.3
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.6.0
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.7.0
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.7.2
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.8.4
-
cpe:2.3:o:abb:ac500_cpu_firmware:2.8.5