7.2
CVE-2023-37857
- EPSS 0.06%
- Veröffentlicht 09.08.2023 07:15:10
- Zuletzt bearbeitet 21.11.2024 08:12:19
- Quelle info@cert.vde.com
- Teams Watchlist Login
- Unerledigt Login
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Phoenixcontact ≫ Wp 6070-wvps Firmware Version < 4.0.10
Phoenixcontact ≫ Wp 6101-wxps Firmware Version < 4.0.10
Phoenixcontact ≫ Wp 6121-wxps Firmware Version < 4.0.10
Phoenixcontact ≫ Wp 6156-whps Firmware Version < 4.0.10
Phoenixcontact ≫ Wp 6185-whps Firmware Version < 4.0.10
Phoenixcontact ≫ Wp 6215-whps Firmware Version < 4.0.10
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.195 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
info@cert.vde.com | 3.8 | 1.2 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N
|
CWE-798 Use of Hard-coded Credentials
The product contains hard-coded credentials, such as a password or cryptographic key.