Lucene search

K
cve[email protected]CVE-2023-37858
HistoryAug 09, 2023 - 7:15 a.m.

CVE-2023-37858

2023-08-0907:15:10
CWE-311
web.nvd.nist.gov
11
phoenix contact
wp 6xxx series
web panels
cve-2023-37858
cryptographic keys
web application login password
security vulnerability

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.2%

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.

Affected configurations

NVD
Node
phoenixcontactwp_6070-wvpsMatch-
AND
phoenixcontactwp_6070-wvps_firmwareRange<4.0.10
Node
phoenixcontactwp_6101-wxpsMatch-
AND
phoenixcontactwp_6101-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6121-wxpsMatch-
AND
phoenixcontactwp_6121-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6156-whpsMatch-
AND
phoenixcontactwp_6156-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6185-whpsMatch-
AND
phoenixcontactwp_6185-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6215-whpsMatch-
AND
phoenixcontactwp_6215-whps_firmwareRange<4.0.10

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "WP 6070-WVPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6101-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6121-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6156-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6185-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6215-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

31.2%

Related for CVE-2023-37858