Critical Unsecured Protocol Vulnerability Reported in Festo Industrial Firmware
Take action: This is a weird report - there will be no patch, the unsecured ports will remain unsecured. Your only option is to isolate the systems from the internet and make them accessible from trusted networks only.
Learn More
CISA and Festo report a critical security flaw in the firmware of many industrial products. The issue is caused by undocumented protocols and functions that allow remote access without a password.
The flaw is tracked as CVE-2022-3270 (CVSS score 9.8), an insufficient technical documentation of remote-accessible functions. Because these protocols are not documented, users cannot see or secure the ports they use. An unauthenticated attacker on the network can trigger these functions to read data, change settings, or crash the system.
The following products and data points are affected:
- Bus modules and nodes: CPX-E-EP, CPX-E-PN, CPX-FB32 through FB43, CPX-M-FB34/35/44/45, CTEU-EP, CTEU-PN.
- Controllers and blocks: CECC-D, CECC-LK, CECC-S, CECC-X, CPX-CEC, CPX-E-CEC, CPX-FEC-1-IE, CPX-CMXX.
- Motor and Servo drives: CMMO-ST, CMMP-AS, CMMT-AS, CMMT-ST, EMCA-EC.
- Vision systems and units: SBO*-C/M/Q, SBRD-Q, CHB-C-N, CDPX operator units.
Festo is updating its technical manuals to describe these hidden protocols. The company recommends isolating all industrial devices from untrusted networks. Users should place control systems behind firewalls and use VPN tunnels for any necessary remote access.