PatchSiren cyber security CVE debrief
CVE-2020-2922 Festo Didactic SE CVE debrief
CVE-2020-2922 is a low-severity information disclosure issue affecting Oracle MySQL Client C API as described in the supplied advisory corpus. The advisory text says an unauthenticated network attacker using multiple protocols could compromise the client and read a subset of accessible data. In the CISA CSAF republish, the advisory is presented in a Festo Didactic SE MES PC context, with vendor remediation pointing to Factory Control Panel as a replacement for XAMPP on MES PCs. For defenders, the main takeaway is exposure management rather than emergency incident response: the CVSS score is 3.7 (LOW), the impact is confidentiality-only, and the source material indicates a vendor replacement/fix path is available. Because the supplied corpus ties the advisory to Festo MES PC while the vulnerability description references Oracle MySQL Client, treat the product mapping carefully and verify which deployed component is actually present before planning remediation.
- Vendor
- Festo Didactic SE
- Product
- MES PC
- CVSS
- LOW 3.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-27
- Original CVE updated
- 2026-01-27
- Advisory published
- 2024-02-27
- Advisory updated
- 2026-01-27
Who should care
Operators and maintainers of Festo Didactic SE MES PC deployments, especially environments that include Oracle MySQL Client/C API components or bundled XAMPP-related tooling. Security teams responsible for industrial/OT workstation hardening and software inventory should also review exposure.
Technical summary
The supplied CVE text describes a network-accessible MySQL Client C API issue with high attack complexity, no privileges required, and no user interaction. If exploited, the attacker can obtain unauthorized read access to a limited subset of client-accessible data. The CVSS vector is CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N, matching a low confidentiality impact with no integrity or availability impact. The CISA CSAF record republishes the advisory under Festo Didactic SE MES PC and links remediation to Factory Control Panel as a replacement for XAMPP on MES PCs.
Defensive priority
Low-to-moderate operational priority. The issue is low severity, but it is network-reachable and unauthenticated, so exposed instances should still be inventoried and remediated where the affected client component is present.
Recommended defensive actions
- Identify whether MES PC systems include the affected Oracle MySQL Client/C API component or related XAMPP tooling.
- Review the Festo advisory and vendor references to confirm the applicable fixed or replacement version for your deployment.
- Obtain the current Factory Control Panel release from Festo technical support if your environment uses the MES PC software path described in the advisory.
- Restrict unnecessary network exposure around affected systems and segment OT/industrial workstations where feasible.
- Validate that any remediation preserves required MES PC functionality before rollout.
- Track asset inventory for the specific MES PC build and document whether the vulnerable component is present or absent.
Evidence notes
The supplied corpus gives the CVE publishedAt as 2024-02-27T12:00:00Z and modifiedAt as 2026-01-27T16:20:28.099Z. The advisory text states affected Oracle MySQL versions 5.6.47 and prior, 5.7.29 and prior, and 8.0.18 and prior, with unauthorized read access as the impact. CISA’s CSAF metadata republishes the issue under Festo Didactic SE MES PC, and the remediation entry says Factory Control Panel replaced XAMPP on MES PCs. The remediation date in the source corpus (2023-05-26) predates the CVE publication timestamp, so it should be treated as vendor fix availability context rather than the disclosure date. The corpus also contains a possible product/vulnerability-description mismatch; the advisory text should be verified against the deployed software stack.
Official resources
-
CVE-2020-2922 CVE record
CVE.org
-
CVE-2020-2922 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
This debrief is based only on the supplied source corpus and official links. It describes a low-severity, network-reachable confidentiality issue and includes a noted source-corpus mismatch between the Oracle MySQL Client description and F