7.2

CVE-2023-37859

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

Data is provided by the National Vulnerability Database (NVD)
PhoenixcontactWp 6070-wvps Firmware Version < 4.0.10
   PhoenixcontactWp 6070-wvps Version-
PhoenixcontactWp 6101-wxps Firmware Version < 4.0.10
   PhoenixcontactWp 6101-wxps Version-
PhoenixcontactWp 6121-wxps Firmware Version < 4.0.10
   PhoenixcontactWp 6121-wxps Version-
PhoenixcontactWp 6156-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6156-whps Version-
PhoenixcontactWp 6185-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6185-whps Version-
PhoenixcontactWp 6215-whps Firmware Version < 4.0.10
   PhoenixcontactWp 6215-whps Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.27% 0.504
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
info@cert.vde.com 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-269 Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.