PatchSiren cyber security CVE debrief
CVE-2022-27378 Festo Didactic SE CVE debrief
CVE-2022-27378 is a high-severity denial-of-service issue referenced in a CISA CSAF advisory for Festo Didactic SE MES PC. The source record’s vulnerability text describes a MariaDB Server flaw involving specially crafted SQL statements, while the advisory remediation points MES PC users to a vendor replacement path.
- Vendor
- Festo Didactic SE
- Product
- MES PC
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2024-02-27
- Original CVE updated
- 2026-01-27
- Advisory published
- 2024-02-27
- Advisory updated
- 2026-01-27
Who should care
Organizations operating Festo Didactic SE MES PC systems, especially teams responsible for availability, maintenance, and incident response. Defenders should also review any environment where the referenced MariaDB-related component or the advisory’s Factory Control Panel/XAMPP replacement path may be in use.
Technical summary
The advisory describes a network-reachable DoS condition with no privileges or user interaction required, and a high availability impact (CVSS 3.1: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). The source text says the issue is in Create_tmp_table::finalize in MariaDB Server v10.7 and below and can be triggered by specially crafted SQL statements. In the CISA CSAF metadata, the advisory is associated with Festo Didactic SE MES PC, and the remediation text directs customers to obtain the current Factory Control Panel version as a replacement for XAMPP.
Defensive priority
High. The issue is rated 7.5/High and can cause service interruption without authentication, so it matters most where MES PC availability is operationally important.
Recommended defensive actions
- Confirm whether your MES PC deployment matches the affected advisory scope in the CISA CSAF record.
- Obtain the vendor-provided current Factory Control Panel version from Festo technical support and plan migration away from XAMPP as directed in the remediation.
- Schedule maintenance to apply the vendor fix and verify any required restart or service interruption in advance.
- Use compensating controls such as network segmentation, least privilege for database-facing services, and monitoring for abnormal SQL activity or availability degradation.
Evidence notes
This debrief is based only on the supplied CISA CSAF source item and the official links it references. The record was initially published on 2024-02-27 and republished on 2026-01-27; the remediation entry in the source data is dated 2023-05-26. The source corpus contains a notable naming mismatch: the vulnerability description references MariaDB Server, while the advisory metadata maps the issue to Festo Didactic SE MES PC and recommends replacing XAMPP with Factory Control Panel.
Official resources
-
CVE-2022-27378 CVE record
CVE.org
-
CVE-2022-27378 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed in the source advisory record on 2024-02-27, with a later CISA republication recorded on 2026-01-27. The source remediation date listed in the record is 2023-05-26.