Search criteria
12 vulnerabilities found for wha-gw-f2d2-0-as-z2-eth.eip_firmware by pepperl-fuchs
CVE-2021-34565 (GCVE-0-2021-34565)
Vulnerability from nvd – Published: 2021-08-31 10:33 – Updated: 2024-09-17 03:22
VLAI?
Title
In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
Severity ?
9.8 (Critical)
CWE
- CWE-798 - Use of Hard-coded Credentials
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.7 , < 3.0.7*
(custom)
Affected: 3.0.9 , ≤ 3.0.9 (custom) |
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.7 , < 3.0.7*
(custom)
Affected: 3.0.9 , ≤ 3.0.9 (custom) |
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.412Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThan": "3.0.7*",
"status": "affected",
"version": "3.0.7",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThan": "3.0.7*",
"status": "affected",
"version": "3.0.7",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:33:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34565",
"STATE": "PUBLIC",
"TITLE": "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_name": "3.0.7",
"version_value": "3.0.7"
},
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_name": "3.0.7",
"version_value": "3.0.7"
},
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798 Use of Hard-coded Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34565",
"datePublished": "2021-08-31T10:33:00.698Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T03:22:29.106Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34563 (GCVE-0-2021-34563)
Vulnerability from nvd – Published: 2021-08-31 10:32 – Updated: 2024-09-17 04:14
VLAI?
Title
In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
Severity ?
CWE
- CWE-1004 - Sensitive Cookie Without 'HttpOnly' Flag
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8
Affected: 3.0.9 |
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8
Affected: 3.0.9 |
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.497Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
},
{
"status": "affected",
"version": "3.0.9"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
},
{
"status": "affected",
"version": "3.0.9"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie\u0027s value to be read or set by client-side JavaScript."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1004",
"description": "CWE-1004 Sensitive Cookie Without \u0027HttpOnly\u0027 Flag",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:58.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34563",
"STATE": "PUBLIC",
"TITLE": "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
},
{
"version_affected": "=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
},
{
"version_affected": "=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie\u0027s value to be read or set by client-side JavaScript."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1004 Sensitive Cookie Without \u0027HttpOnly\u0027 Flag"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34563",
"datePublished": "2021-08-31T10:32:58.577Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:14:32.706Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34562 (GCVE-0-2021-34562)
Vulnerability from nvd – Published: 2021-08-31 10:32 – Updated: 2024-09-17 00:56
VLAI?
Title
A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Cross-site Scripting (XSS)
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.405Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:57.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34562",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34562",
"datePublished": "2021-08-31T10:32:57.523Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T00:56:48.045Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34561 (GCVE-0-2021-34561)
Vulnerability from nvd – Published: 2021-08-31 10:32 – Updated: 2024-09-17 01:56
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
Severity ?
7.5 (High)
CWE
- CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.414Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target\u0027s browser."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-350",
"description": "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:56.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34561",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target\u0027s browser."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34561",
"datePublished": "2021-08-31T10:32:56.470Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T01:56:32.573Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34560 (GCVE-0-2021-34560)
Vulnerability from nvd – Published: 2021-08-31 10:32 – Updated: 2024-09-16 23:00
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
Severity ?
5.5 (Medium)
CWE
- CWE-522 - Insufficiently Protected Credentials
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.9 , ≤ 3.0.9
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.9 , ≤ 3.0.9
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.418Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user\u0027s computer. Therefore the user must have logged in at least once."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:55.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.9 could lead to information exposure of sensitive information",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34560",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.9 could lead to information exposure of sensitive information"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user\u0027s computer. Therefore the user must have logged in at least once."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-522 Insufficiently Protected Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34560",
"datePublished": "2021-08-31T10:32:55.386Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-16T23:00:54.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34559 (GCVE-0-2021-34559)
Vulnerability from nvd – Published: 2021-08-31 10:32 – Updated: 2024-09-16 17:33
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
Severity ?
5.4 (Medium)
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:53.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34559",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34559",
"datePublished": "2021-08-31T10:32:54.004Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-16T17:33:00.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34565 (GCVE-0-2021-34565)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:33 – Updated: 2024-09-17 03:22
VLAI?
Title
In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
Severity ?
9.8 (Critical)
CWE
- CWE-798 - Use of Hard-coded Credentials
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.7 , < 3.0.7*
(custom)
Affected: 3.0.9 , ≤ 3.0.9 (custom) |
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.7 , < 3.0.7*
(custom)
Affected: 3.0.9 , ≤ 3.0.9 (custom) |
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.412Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThan": "3.0.7*",
"status": "affected",
"version": "3.0.7",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThan": "3.0.7*",
"status": "affected",
"version": "3.0.7",
"versionType": "custom"
},
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-798",
"description": "CWE-798 Use of Hard-coded Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:33:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34565",
"STATE": "PUBLIC",
"TITLE": "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_name": "3.0.7",
"version_value": "3.0.7"
},
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003e=",
"version_name": "3.0.7",
"version_value": "3.0.7"
},
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-798 Use of Hard-coded Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34565",
"datePublished": "2021-08-31T10:33:00.698Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T03:22:29.106Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34563 (GCVE-0-2021-34563)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:32 – Updated: 2024-09-17 04:14
VLAI?
Title
In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
Severity ?
CWE
- CWE-1004 - Sensitive Cookie Without 'HttpOnly' Flag
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8
Affected: 3.0.9 |
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8
Affected: 3.0.9 |
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.497Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
},
{
"status": "affected",
"version": "3.0.9"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
},
{
"status": "affected",
"version": "3.0.9"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie\u0027s value to be read or set by client-side JavaScript."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1004",
"description": "CWE-1004 Sensitive Cookie Without \u0027HttpOnly\u0027 Flag",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:58.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34563",
"STATE": "PUBLIC",
"TITLE": "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
},
{
"version_affected": "=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
},
{
"version_affected": "=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie\u0027s value to be read or set by client-side JavaScript."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-1004 Sensitive Cookie Without \u0027HttpOnly\u0027 Flag"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34563",
"datePublished": "2021-08-31T10:32:58.577Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:14:32.706Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34562 (GCVE-0-2021-34562)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:32 – Updated: 2024-09-17 00:56
VLAI?
Title
A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Cross-site Scripting (XSS)
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.405Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"status": "affected",
"version": "3.0.8"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:57.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34562",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application\u0027s response."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34562",
"datePublished": "2021-08-31T10:32:57.523Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T00:56:48.045Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34561 (GCVE-0-2021-34561)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:32 – Updated: 2024-09-17 01:56
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
Severity ?
7.5 (High)
CWE
- CWE-350 - Reliance on Reverse DNS Resolution for a Security-Critical Action
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.414Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target\u0027s browser."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-350",
"description": "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:56.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34561",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target\u0027s browser."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34561",
"datePublished": "2021-08-31T10:32:56.470Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-17T01:56:32.573Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34560 (GCVE-0-2021-34560)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:32 – Updated: 2024-09-16 23:00
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
Severity ?
5.5 (Medium)
CWE
- CWE-522 - Insufficiently Protected Credentials
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.9 , ≤ 3.0.9
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.9 , ≤ 3.0.9
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.418Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.9",
"status": "affected",
"version": "3.0.9",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user\u0027s computer. Therefore the user must have logged in at least once."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-522",
"description": "CWE-522 Insufficiently Protected Credentials",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:55.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.9 could lead to information exposure of sensitive information",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34560",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.9 could lead to information exposure of sensitive information"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.9",
"version_value": "3.0.9"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user\u0027s computer. Therefore the user must have logged in at least once."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-522 Insufficiently Protected Credentials"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34560",
"datePublished": "2021-08-31T10:32:55.386Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-16T23:00:54.389Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34559 (GCVE-0-2021-34559)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:32 – Updated: 2024-09-16 17:33
VLAI?
Title
A vulnerability in WirelessHART-Gateway <= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
Severity ?
5.4 (Medium)
CWE
- CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Assigner
References
1 reference
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 | x_refsource_CONFIRM |
Impacted products
2 products
| Vendor | Product | Version | |
|---|---|---|---|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
|
| Phoenix Contact | WHA-GW-F2D2-0-AS- Z2-ETH.EIP |
Affected:
3.0.8 , ≤ 3.0.8
(custom)
|
Date Public ?
2021-08-16 00:00
Credits
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:12:50.377Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
},
{
"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"vendor": "Phoenix Contact",
"versions": [
{
"lessThanOrEqual": "3.0.8",
"status": "affected",
"version": "3.0.8",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-444",
"description": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:32:53.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
],
"solutions": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"title": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings",
"workarounds": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-16T07:07:00.000Z",
"ID": "CVE-2021-34559",
"STATE": "PUBLIC",
"TITLE": "A vulnerability in WirelessHART-Gateway \u003c= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
},
{
"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "3.0.8",
"version_value": "3.0.8"
}
]
}
}
]
},
"vendor_name": "Phoenix Contact"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PEPPERL+FUCHS WirelessHART-Gateway \u003c= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-444 Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request Smuggling\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-027",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-027"
}
]
},
"solution": [
{
"lang": "en",
"value": "No update available."
}
],
"source": {
"advisory": "VDE-2021-027",
"discovery": "INTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34559",
"datePublished": "2021-08-31T10:32:54.004Z",
"dateReserved": "2021-06-10T00:00:00.000Z",
"dateUpdated": "2024-09-16T17:33:00.268Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}