Undocumented Protocol Exploitation: A Threat to Confidentiality, Integrity, and Availability in Festo Products

Undocumented Protocol Exploitation: A Threat to Confidentiality, Integrity, and Availability in Festo Products

CVE-2022-3270 · CRITICAL Severity

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

In multiple products by Festo a remote unauthenticated attacker could use functions of an undocumented protocol which could lead to a complete loss of confidentiality, integrity and availability.

Learn more about our Web Application Penetration Testing UK.