In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2023-018/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
No history.
Information
Published : 2023-08-08 07:15
Updated : 2023-09-08 09:15
NVD link : CVE-2023-3572
Mitre link : CVE-2023-3572
CVE.ORG link : CVE-2023-3572
JSON object : View
Products Affected
phoenixcontact
- wp_6215-whps_firmware
- wp_6070-wvps
- wp_6215-whps
- wp_6121-wxps_firmware
- wp_6070-wvps_firmware
- wp_6101-wxps_firmware
- wp_6156-whps
- wp_6121-wxps
- wp_6156-whps_firmware
- wp_6185-whps_firmware
- wp_6101-wxps
- wp_6185-whps
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')