8.8

CVE-2023-3573

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PhoenixcontactWp 6070-wvps Firmware Version < 4.0.10
   PhoenixcontactWp 6070-wvps Version-
PhoenixcontactWp 6101-wxps Firmware Version < 4.0.10
   PhoenixcontactWp 6101-wxps Version-
PhoenixcontactWp 6121-wxps Firmware Version < 4.0.10
   PhoenixcontactWp 6121-wxps Version-
PhoenixcontactWp 6156-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6156-whps Version-
PhoenixcontactWp 6185-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6185-whps Version-
PhoenixcontactWp 6215-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6215-whps Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.67% 0.7
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
info@cert.vde.com 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 8.8 2.8 5.9
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.