8

CVE-2022-4098

Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.

Data is provided by the National Vulnerability Database (NVD)
WutCom-server ++ Firmware Version < 1.55
   WutCom-server ++ Version-
WutCom-server 20ma Firmware Version < 1.55
   WutCom-server 20ma Version-
WutCom-server Highspeed Oem Firmware Version < 1.78
   WutCom-server Highspeed Oem Version-
WutCom-server Highspeed Poe Firmware Version < 1.78
   WutCom-server Highspeed Poe Version-
WutCom-server Highspeed Lc Firmware Version < 1.55
   WutCom-server Highspeed Lc Version-
WutCom-server Highspeed Ul Firmware Version < 1.55
   WutCom-server Highspeed Ul Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.071
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
info@cert.vde.com 8 2.1 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
nvd@nist.gov 8 2.1 5.9
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CWE-290 Authentication Bypass by Spoofing

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.