Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-33534 (GCVE-0-2021-33534)
Vulnerability from cvelistv5 – Published: 2021-06-25 18:25 – Updated: 2024-09-17 04:20- CWE-78 - OS Command Injection
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Affected:
IE-WL-BL-AP-CL-EU (2536600000) , ≤ V1.16.18 (Build 18081617)
(custom)
Affected: IE-WLT-BL-AP-CL-EU (2536650000) , ≤ V1.16.18 (Build 18081617) (custom) Affected: IE-WL-BL-AP-CL-US (2536660000) , ≤ V1.16.18 (Build 18081617) (custom) Affected: IE-WLT-BL-AP-CL-US (2536670000) , ≤ V1.16.18 (Build 18081617) (custom) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:50:42.975Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "IE-WL(T)-BL-AP-CL-XX",
"vendor": "Weidm\u00fcller",
"versions": [
{
"lessThanOrEqual": "V1.16.18 (Build 18081617)",
"status": "affected",
"version": "IE-WL-BL-AP-CL-EU (2536600000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.16.18 (Build 18081617)",
"status": "affected",
"version": "IE-WLT-BL-AP-CL-EU (2536650000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.16.18 (Build 18081617)",
"status": "affected",
"version": "IE-WL-BL-AP-CL-US (2536660000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.16.18 (Build 18081617)",
"status": "affected",
"version": "IE-WLT-BL-AP-CL-US (2536670000)",
"versionType": "custom"
}
]
},
{
"product": "IE-WL(T)-VL-AP-CL-XX",
"vendor": "Weidm\u00fcller",
"versions": [
{
"lessThanOrEqual": "V1.11.10 (Build 18122616)",
"status": "affected",
"version": "IE-WL-VL-AP-BR-CL-EU (2536680000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.11.10 (Build 18122616)",
"status": "affected",
"version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.11.10 (Build 18122616)",
"status": "affected",
"version": "IE-WL-VL-AP-BR-CL-US (2536700000)",
"versionType": "custom"
},
{
"lessThanOrEqual": "V1.11.10 (Build 18122616)",
"status": "affected",
"version": "IE-WLT-VL-AP-BR-CL-US (2536710000)",
"versionType": "custom"
}
]
}
],
"datePublic": "2021-06-23T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 OS Command Injection",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-02T10:33:06.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
],
"solutions": [
{
"lang": "en",
"value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed."
}
],
"source": {
"advisory": "VDE-2021-026",
"defect": [
"VDE-2021-026"
],
"discovery": "EXTERNAL"
},
"title": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-06-23T10:00:00.000Z",
"ID": "CVE-2021-33534",
"STATE": "PUBLIC",
"TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IE-WL(T)-BL-AP-CL-XX",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "IE-WL-BL-AP-CL-EU (2536600000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-BL-AP-CL-EU (2536650000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WL-BL-AP-CL-US (2536660000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-BL-AP-CL-US (2536670000)",
"version_value": "V1.16.18 (Build 18081617)"
}
]
}
},
{
"product_name": "IE-WL(T)-VL-AP-CL-XX",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)",
"version_value": "V1.11.10 (Build 18122616)"
}
]
}
}
]
},
"vendor_name": "Weidm\u00fcller"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-026",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
]
},
"solution": [
{
"lang": "en",
"value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed."
}
],
"source": {
"advisory": "VDE-2021-026",
"defect": [
"VDE-2021-026"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-33534",
"datePublished": "2021-06-25T18:25:59.235Z",
"dateReserved": "2021-05-24T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:20:16.498Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2021-33534\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2021-06-25T19:15:09.297\",\"lastModified\":\"2024-11-21T06:09:01.707\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.\"},{\"lang\":\"es\",\"value\":\"En los dispositivos WLAN industriales de Weidmueller en m\u00faltiples versiones existe una vulnerabilidad de inyecci\u00f3n de comandos explotable en la funcionalidad de nombre de host. Una entrada especialmente dise\u00f1ada para la informaci\u00f3n de configuraci\u00f3n de la red puede causar la ejecuci\u00f3n de comandos arbitrarios del sistema, lo que resulta en el control total del dispositivo. Un atacante puede enviar varias peticiones mientras est\u00e1 autenticado como usuario con altos privilegios para activar esta vulnerabilidad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"4E409B45-BF28-41AD-B3A7-656FBAF9597D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26A4612B-2370-42CA-8EC4-5C74382ABDA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"17F26A4C-FDBA-48A8-AC05-1A779F0051F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC895FDA-C846-4885-AADB-DED6EC868C3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"0C589467-C35D-43E8-AE06-9C0541DF2190\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D7BBC3-6F43-47B5-81E2-431C8837BB3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"2E1B5E87-7D1E-45FD-894C-31167B80BEB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D38EC42-5C2E-4ACE-88A1-2890632E51DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"5C2C095A-F606-4A7A-9836-EAA17A648E50\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17790AD1-5DE3-47F4-A16C-67C7DFE56128\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"DE71A6A8-3E2A-4EC3-A719-0AC48B99C1F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E4AE7D-CA1F-45FC-9D8F-725E71832D2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"C171799A-4FEE-43F4-A7EE-8B1A52828FF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DED5CF2-3B42-4D92-9647-AC54D07C6B20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.16.18\",\"matchCriteriaId\":\"AF79779D-863D-4B8B-A4B4-BFD0F3528442\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1209D9A9-D6AA-44C3-AD34-18C145851D5B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"F6210516-CB15-4099-B91E-63AE16C71B17\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26A4612B-2370-42CA-8EC4-5C74382ABDA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"BA154861-7D17-4FF1-8326-6B01B1E4A624\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC895FDA-C846-4885-AADB-DED6EC868C3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"E865089B-638A-491A-9527-EB1A21C9A3D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D7BBC3-6F43-47B5-81E2-431C8837BB3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"2A3DCCA5-38A5-4661-8EA5-5DB21C92DA56\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D38EC42-5C2E-4ACE-88A1-2890632E51DA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"B455D775-9B0E-4DCF-BDA6-0861F5C34362\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17790AD1-5DE3-47F4-A16C-67C7DFE56128\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"EE88298B-D13E-4B19-8C77-15FB57FC4A9A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23E4AE7D-CA1F-45FC-9D8F-725E71832D2A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"4D71C498-B58B-4FDC-AA9F-508D61F03E8B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DED5CF2-3B42-4D92-9647-AC54D07C6B20\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.11.10\",\"matchCriteriaId\":\"16DA2FEB-D762-44C1-9C45-3FC6017CE1D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1209D9A9-D6AA-44C3-AD34-18C145851D5B\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2021-026\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2021-026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
CNVD-2021-48131
Vulnerability from cnvd - Published: 2021-07-07厂商已发布了漏洞修复程序,请及时关注更新: https://www.weidmueller.com/int/index.jsp
| Name | ['Weidmueller IE-WL-BL-AP-CL-US <=V1.16.18 (Build 18081617)', 'Weidmueller IE-WLT-BL-AP-CL-US <=V1.16.18 (Build 18081617)', 'Weidmueller IE-WL-BL-AP-CL-EU <=V1.16.18 (Build 18081617)', 'Weidmueller IE-WLT-BL-AP-CL-EU <=V1.16.18 (Build 18081617)', 'Weidmueller IE-WL-VL-AP-BR-CL-EU <=V1.11.10 (Build 18122616)', 'Weidmueller IE-WLT-VL-AP-BR-CL-EU <=V1.11.10 (Build 18122616)', 'Weidmueller IE-WL-VL-AP-BR-CL-US <=V1.11.10 (Build 18122616)', 'Weidmueller IE-WLT-VL-AP-BR-CL-US <=V1.11.10 (Build 18122616)'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-33534",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-33534"
}
},
"description": "Weidmueller Industrial WLAN devices\u662f\u5fb7\u56fdWeidmueller\u516c\u53f8\u7684\u4e00\u4e2a\u5de5\u63a7WIAN\u3002\n\nWeidmueller Industrial WLAN devices\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7279\u5236\u7684\u7f51\u7edc\u914d\u7f6e\u4fe1\u606f\u6761\u76ee\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u7cfb\u7edf\u547d\u4ee4\uff0c\u4ece\u800c\u5b8c\u5168\u63a7\u5236\u8bbe\u5907\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f,\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.weidmueller.com/int/index.jsp",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-48131",
"openTime": "2021-07-07",
"patchDescription": "Weidmueller Industrial WLAN devices\u662f\u5fb7\u56fdWeidmueller\u516c\u53f8\u7684\u4e00\u4e2a\u5de5\u63a7WIAN\u3002\r\n\r\nWeidmueller Industrial WLAN devices\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7279\u5236\u7684\u7f51\u7edc\u914d\u7f6e\u4fe1\u606f\u6761\u76ee\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u6267\u884c\u4efb\u610f\u7cfb\u7edf\u547d\u4ee4\uff0c\u4ece\u800c\u5b8c\u5168\u63a7\u5236\u8bbe\u5907\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Weidmueller Industrial WLAN devices\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-48131\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Weidmueller IE-WL-BL-AP-CL-US \u003c=V1.16.18 (Build 18081617)",
"Weidmueller IE-WLT-BL-AP-CL-US \u003c=V1.16.18 (Build 18081617)",
"Weidmueller IE-WL-BL-AP-CL-EU \u003c=V1.16.18 (Build 18081617)",
"Weidmueller IE-WLT-BL-AP-CL-EU \u003c=V1.16.18 (Build 18081617)",
"Weidmueller IE-WL-VL-AP-BR-CL-EU \u003c=V1.11.10 (Build 18122616)",
"Weidmueller IE-WLT-VL-AP-BR-CL-EU \u003c=V1.11.10 (Build 18122616)",
"Weidmueller IE-WL-VL-AP-BR-CL-US \u003c=V1.11.10 (Build 18122616)",
"Weidmueller IE-WLT-VL-AP-BR-CL-US \u003c=V1.11.10 (Build 18122616)"
]
},
"referenceLink": "https://cert.vde.com/en-us/advisories/vde-2021-026",
"serverity": "\u9ad8",
"submitTime": "2021-06-28",
"title": "Weidmueller Industrial WLAN devices\u64cd\u4f5c\u7cfb\u7edf\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\uff08CNVD-2021-48131\uff09"
}
GHSA-VJCC-R8CC-JQJ4
Vulnerability from github – Published: 2022-05-24 19:06 – Updated: 2022-05-24 19:06In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability.
{
"affected": [],
"aliases": [
"CVE-2021-33534"
],
"database_specific": {
"cwe_ids": [
"CWE-78"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-06-25T19:15:00Z",
"severity": "HIGH"
},
"details": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various authenticated requests to trigger this vulnerability.",
"id": "GHSA-vjcc-r8cc-jqj4",
"modified": "2022-05-24T19:06:16Z",
"published": "2022-05-24T19:06:16Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33534"
},
{
"type": "WEB",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
],
"schema_version": "1.4.0",
"severity": []
}
VDE-2021-026
Vulnerability from csaf_weidmuellerinterfacegmbhcokg - Published: 2021-06-23 11:04 - Updated: 2025-05-14 13:00In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Multiple issues in Weidmueller Industrial WLAN devices have been found.\n\nInitial publication date: 2021-06-23\nUpdate A publication date: 2021-07-02\n\nUpdate A\n\nCVE-2021-33534\n\nCVSS: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\nDescription: An exploitable command injection vulnerability exists in the hostname functionality of Weidmueller Industrial WLAN devices. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.",
"title": "Summary"
},
{
"category": "description",
"text": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.\n",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@weidmueller.com",
"name": "Weidmueller Interface GmbH \u0026 Co. KG",
"namespace": "https://www.weidmueller.com"
},
"references": [
{
"category": "external",
"summary": "Weidmueller advisory overview at CERT@VDE",
"url": "https://certvde.com/de/advisories/vendor/weidmueller/"
},
{
"category": "self",
"summary": "VDE-2021-026: Weidmueller: Multiple vulnerabilities in Industrial WLAN devices - HTML",
"url": "https://certvde.com/en/advisories/VDE-2021-026"
},
{
"category": "self",
"summary": "VDE-2021-026: Weidmueller: Multiple vulnerabilities in Industrial WLAN devices - CSAF",
"url": "https://weidmueller.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-026.json"
}
],
"title": "Weidmueller: Multiple vulnerabilities in Industrial WLAN devices",
"tracking": {
"aliases": [
"VDE-2021-026"
],
"current_release_date": "2025-05-14T13:00:15.000Z",
"generator": {
"date": "2025-04-10T14:07:15.625Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.23"
}
},
"id": "VDE-2021-026",
"initial_release_date": "2021-06-23T11:04:00.000Z",
"revision_history": [
{
"date": "2021-06-23T11:04:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2021-07-02T10:00:00.000Z",
"number": "2",
"summary": "Update A"
},
{
"date": "2025-04-10T10:00:00.000Z",
"number": "3",
"summary": "Fix: change vendor name"
},
{
"date": "2025-05-14T13:00:15.000Z",
"number": "4",
"summary": "Fix: added distribution"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "IE-WL-BL-AP-CL-EU",
"product": {
"name": "IE-WL-BL-AP-CL-EU",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"2536600000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WL-BL-AP-CL-US",
"product": {
"name": "IE-WL-BL-AP-CL-US",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2536660000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WLT-BL-AP-CL-EU",
"product": {
"name": "IE-WLT-BL-AP-CL-EU",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"2536650000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WLT-BL-AP-CL-US",
"product": {
"name": "IE-WLT-BL-AP-CL-US",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"2536670000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WLT-VL-AP-BR-CL-EU",
"product": {
"name": "IE-WLT-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"2536690000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WLT-VL-AP-BR-CL-US",
"product": {
"name": "IE-WLT-VL-AP-BR-CL-US",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"model_numbers": [
"2536710000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WL-VL-AP-BR-CL-EU",
"product": {
"name": "IE-WL-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"model_numbers": [
"2536680000"
]
}
}
},
{
"category": "product_name",
"name": "IE-WL-VL-AP-BR-CL-US",
"product": {
"name": "IE-WL-VL-AP-BR-CL-US",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"model_numbers": [
"2536700000"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.11.10 (Build 18122616)",
"product": {
"name": "Firmware \u003c=V1.11.10 (Build 18122616)",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c=V1.16.18 (Build 18081617)",
"product": {
"name": "Firmware \u003c=V1.16.18 (Build 18081617)",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "V1.16.21 (Build 21010513)",
"product": {
"name": "Firmware V1.16.21 (Build 21010513)",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "V1.11.13 (Build 21010513)",
"product": {
"name": "Firmware V1.11.13 (Build 21010513)",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Weidmueller"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"summary": "Fixed Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.16.18 (Build 18081617) installed on IE-WL-BL-AP-CL-EU",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.16.18 (Build 18081617) installed on IE-WL-BL-AP-CL-US",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.16.18 (Build 18081617) installed on IE-WLT-BL-AP-CL-EU",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.16.18 (Build 18081617) installed on IE-WLT-BL-AP-CL-US",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.11.10 (Build 18122616) installed on IE-WLT-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.11.10 (Build 18122616) installed on IE-WLT-VL-AP-BR-CL-US",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.11.10 (Build 18122616) installed on IE-WL-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.11.10 (Build 18122616) installed on IE-WL-VL-AP-BR-CL-US",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.16.21 (Build 21010513) installed on IE-WL-BL-AP-CL-EU",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.16.21 (Build 21010513) installed on IE-WLT-BL-AP-CL-EU",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.16.21 (Build 21010513) installed on IE-WL-BL-AP-CL-US",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.16.21 (Build 21010513) installed on IE-WLT-BL-AP-CL-US",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.11.13 (Build 21010513) installed on IE-WL-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.11.13 (Build 21010513) installed on IE-WLT-VL-AP-BR-CL-EU",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.11.13 (Build 21010513) installed on IE-WL-VL-AP-BR-CL-US",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.11.13 (Build 21010513) installed on IE-WLT-VL-AP-BR-CL-US",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11006"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33531",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33531"
},
{
"cve": "CVE-2021-33532",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33532"
},
{
"cve": "CVE-2021-33537",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33537"
},
{
"cve": "CVE-2021-33538",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33538"
},
{
"cve": "CVE-2021-33533",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33533"
},
{
"cve": "CVE-2021-33528",
"cwe": {
"id": "CWE-710",
"name": "Improper Adherence to Coding Standards"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33528"
},
{
"cve": "CVE-2021-33535",
"cwe": {
"id": "CWE-134",
"name": "Use of Externally-Controlled Format String"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33535"
},
{
"cve": "CVE-2021-33530",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33530"
},
{
"cve": "CVE-2021-33529",
"cwe": {
"id": "CWE-798",
"name": "Use of Hard-coded Credentials"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33529"
},
{
"cve": "CVE-2021-33536",
"cwe": {
"id": "CWE-191",
"name": "Integer Underflow (Wrap or Wraparound)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33536"
},
{
"cve": "CVE-2021-33539",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33539"
},
{
"cve": "CVE-2021-33534",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "description",
"text": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. \n\nPlease follow the procedure below to download and install the latest firmware for your device:\n\n1. Use the link: [www.weidmueller.com](www.weidmueller.com)\n2. Enter the product number of the Industrial WLAN device you want to update in the search field on the webpage and press \"Enter\".\n3. On the next page, expand the drop-down menu **\"Downloads\"**.\n4. Download the respective firmware from the download table.\n5. Install the firmware on your device.\n\nPatched firmware versions for all affected products\n\n| Product number | Product name | Firmware version |\n|---------------|-----------------------------------|------------------------------------------|\n| 2536600000 | IE-WL-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536650000 | IE-WLT-BL-AP-CL-EU | \u003c= V1.16.21 (Build 21010513) |\n| 2536660000 | IE-WL-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536670000 | IE-WLT-BL-AP-CL-US | \u003c= V1.16.21 (Build 21010513) |\n| 2536680000 | IE-WL-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536690000 | IE-WLT-VL-AP-BR-CL-EU | \u003c= V1.11.13 (Build 21010513) |\n| 2536700000 | IE-WL-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n| 2536710000 | IE-WLT-VL-AP-BR-CL-US | \u003c= V1.11.13 (Build 21010513) |\n\nIf a firmware update is available for your device, please follow the steps above to install it.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.2,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 7.2,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008"
]
}
],
"title": "CVE-2021-33534"
}
]
}
FKIE_CVE-2021-33534
Vulnerability from fkie_nvd - Published: 2021-06-25 19:15 - Updated: 2024-11-21 06:097.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en-us/advisories/vde-2021-026 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2021-026 | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E409B45-BF28-41AD-B3A7-656FBAF9597D",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26A4612B-2370-42CA-8EC4-5C74382ABDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "17F26A4C-FDBA-48A8-AC05-1A779F0051F3",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC895FDA-C846-4885-AADB-DED6EC868C3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C589467-C35D-43E8-AE06-9C0541DF2190",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97D7BBC3-6F43-47B5-81E2-431C8837BB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1B5E87-7D1E-45FD-894C-31167B80BEB1",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D38EC42-5C2E-4ACE-88A1-2890632E51DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2C095A-F606-4A7A-9836-EAA17A648E50",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17790AD1-5DE3-47F4-A16C-67C7DFE56128",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE71A6A8-3E2A-4EC3-A719-0AC48B99C1F5",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E4AE7D-CA1F-45FC-9D8F-725E71832D2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C171799A-4FEE-43F4-A7EE-8B1A52828FF7",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DED5CF2-3B42-4D92-9647-AC54D07C6B20",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF79779D-863D-4B8B-A4B4-BFD0F3528442",
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1209D9A9-D6AA-44C3-AD34-18C145851D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6210516-CB15-4099-B91E-63AE16C71B17",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26A4612B-2370-42CA-8EC4-5C74382ABDA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BA154861-7D17-4FF1-8326-6B01B1E4A624",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC895FDA-C846-4885-AADB-DED6EC868C3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E865089B-638A-491A-9527-EB1A21C9A3D9",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97D7BBC3-6F43-47B5-81E2-431C8837BB3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A3DCCA5-38A5-4661-8EA5-5DB21C92DA56",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D38EC42-5C2E-4ACE-88A1-2890632E51DA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B455D775-9B0E-4DCF-BDA6-0861F5C34362",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17790AD1-5DE3-47F4-A16C-67C7DFE56128",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE88298B-D13E-4B19-8C77-15FB57FC4A9A",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23E4AE7D-CA1F-45FC-9D8F-725E71832D2A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4D71C498-B58B-4FDC-AA9F-508D61F03E8B",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DED5CF2-3B42-4D92-9647-AC54D07C6B20",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16DA2FEB-D762-44C1-9C45-3FC6017CE1D7",
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1209D9A9-D6AA-44C3-AD34-18C145851D5B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability."
},
{
"lang": "es",
"value": "En los dispositivos WLAN industriales de Weidmueller en m\u00faltiples versiones existe una vulnerabilidad de inyecci\u00f3n de comandos explotable en la funcionalidad de nombre de host. Una entrada especialmente dise\u00f1ada para la informaci\u00f3n de configuraci\u00f3n de la red puede causar la ejecuci\u00f3n de comandos arbitrarios del sistema, lo que resulta en el control total del dispositivo. Un atacante puede enviar varias peticiones mientras est\u00e1 autenticado como usuario con altos privilegios para activar esta vulnerabilidad"
}
],
"id": "CVE-2021-33534",
"lastModified": "2024-11-21T06:09:01.707",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-25T19:15:09.297",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
GSD-2021-33534
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-33534",
"description": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.",
"id": "GSD-2021-33534"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-33534"
],
"details": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.",
"id": "GSD-2021-33534",
"modified": "2023-12-13T01:23:18.364787Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-06-23T10:00:00.000Z",
"ID": "CVE-2021-33534",
"STATE": "PUBLIC",
"TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "IE-WL(T)-BL-AP-CL-XX",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "IE-WL-BL-AP-CL-EU (2536600000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-BL-AP-CL-EU (2536650000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WL-BL-AP-CL-US (2536660000)",
"version_value": "V1.16.18 (Build 18081617)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-BL-AP-CL-US (2536670000)",
"version_value": "V1.16.18 (Build 18081617)"
}
]
}
},
{
"product_name": "IE-WL(T)-VL-AP-CL-XX",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)",
"version_value": "V1.11.10 (Build 18122616)"
},
{
"version_affected": "\u003c=",
"version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)",
"version_value": "V1.11.10 (Build 18122616)"
}
]
}
}
]
},
"vendor_name": "Weidm\u00fcller"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-78 OS Command Injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-026",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
]
},
"solution": [
{
"lang": "eng",
"value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed."
}
],
"source": {
"advisory": "VDE-2021-026",
"defect": [
"VDE-2021-026"
],
"discovery": "EXTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.16.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-bl-ap-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-bl-ap-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-eu_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-eu:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wl-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wl-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:weidmueller:ie-wlt-vl-ap-br-cl-us_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.11.10",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:weidmueller:ie-wlt-vl-ap-br-cl-us:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"ID": "CVE-2021-33534"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-026",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-08T16:19Z",
"publishedDate": "2021-06-25T19:15Z"
}
}
}
VAR-202106-1218
Vulnerability from variot - Updated: 2024-08-14 13:23In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202106-1218",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "ie-wlt-vl-ap-br-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wl-vl-ap-br-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wlt-vl-ap-br-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wl-bl-ap-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wl-bl-ap-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wlt-vl-ap-br-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wl-vl-ap-br-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wlt-vl-ap-br-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wlt-bl-ap-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wlt-bl-ap-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wl-bl-ap-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wl-bl-ap-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wl-vl-ap-br-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.11.10"
},
{
"model": "ie-wl-vl-ap-br-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wlt-bl-ap-cl-eu",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wlt-bl-ap-cl-us",
"scope": "lte",
"trust": 1.0,
"vendor": "weidmueller",
"version": "1.16.18"
},
{
"model": "ie-wlt-bl-ap-cl-eu",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wl-vl-ap-br-cl-eu",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wlt-bl-ap-cl-us",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wlt-vl-ap-br-cl-eu",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wl-bl-ap-cl-eu",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wl-bl-ap-cl-us",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wlt-vl-ap-br-cl-us",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wl-vl-ap-br-cl-us",
"scope": null,
"trust": 0.8,
"vendor": "weidmueller",
"version": null
},
{
"model": "ie-wl-bl-ap-cl-us (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.16.1818081617)"
},
{
"model": "ie-wlt-bl-ap-cl-us (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.16.1818081617)"
},
{
"model": "ie-wl-bl-ap-cl-eu (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.16.1818081617)"
},
{
"model": "ie-wlt-bl-ap-cl-eu (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.16.1818081617)"
},
{
"model": "ie-wl-vl-ap-br-cl-eu (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.11.1018122616)"
},
{
"model": "ie-wlt-vl-ap-br-cl-eu (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.11.1018122616)"
},
{
"model": "ie-wl-vl-ap-br-cl-us (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.11.1018122616)"
},
{
"model": "ie-wlt-vl-ap-br-cl-us (build",
"scope": "lte",
"trust": 0.6,
"vendor": "weidmueller",
"version": "\u003c=v1.11.1018122616)"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"cve": "CVE-2021-33534",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CVE-2021-33534",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2021-48131",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"id": "CVE-2021-33534",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "OTHER",
"availabilityImpact": "High",
"baseScore": 7.2,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2021-008529",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-33534",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "info@cert.vde.com",
"id": "CVE-2021-33534",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-33534",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2021-48131",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202106-1762",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability. Weidmueller Industrial WLAN devices is an industrial control WIAN of Weidmueller company in Germany",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-33534"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "CNVD",
"id": "CNVD-2021-48131"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-33534",
"trust": 3.8
},
{
"db": "CERT@VDE",
"id": "VDE-2021-026",
"trust": 3.0
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-48131",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202106-1762",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"id": "VAR-202106-1218",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
}
],
"trust": 1.265476225
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
}
]
},
"last_update_date": "2024-08-14T13:23:31.421000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top\u00a0Page",
"trust": 0.8,
"url": "https://www.weidmueller.com/int/index.jsp"
},
{
"title": "Patch for Weidmueller Industrial WLAN devices operating system command injection vulnerability (CNVD-2021-48131)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/277121"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.0
},
{
"problemtype": "OS Command injection (CWE-78) [ Other ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://cert.vde.com/en-us/advisories/vde-2021-026"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33534"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-07-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"date": "2022-03-18T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"date": "2021-06-25T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"date": "2021-06-25T19:15:09.297000",
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-07-07T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-48131"
},
{
"date": "2022-03-18T06:30:00",
"db": "JVNDB",
"id": "JVNDB-2021-008529"
},
{
"date": "2021-07-09T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202106-1762"
},
{
"date": "2021-07-08T16:19:30.693000",
"db": "NVD",
"id": "CVE-2021-33534"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "plural \u00a0Weidmueller\u00a0Industrial\u00a0WLAN\u00a0 In the device \u00a0OS\u00a0 Command injection vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-008529"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202106-1762"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.