cve/2021/CVE-2021-20997.md
2024-06-18 02:51:15 +02:00

25 lines
1.3 KiB
Markdown

### [CVE-2021-20997](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-20997)
![](https://img.shields.io/static/v1?label=Product&message=0852-0303&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=0852-1305%2F000-001&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=0852-1305&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=0852-1505%2F000-001&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=0852-1505&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%20V1.0.4.S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%20V1.1.6.S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%20V1.1.7.S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=%3C%3D%20V1.2.3.S0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%20Insufficiently%20Protected%20Credentials&color=brighgreen)
### Description
In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2021-013
#### Github
No PoCs found on GitHub currently.