cvelist/2023/37xxx/CVE-2023-37858.json

159 lines
5.9 KiB
JSON
Raw Normal View History

2023-07-10 15:32:35 +00:00
{
2023-08-09 07:00:33 +00:00
"data_version": "4.0",
2023-07-10 15:32:35 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-37858",
2023-08-09 07:00:33 +00:00
"ASSIGNER": "info@cert.vde.com",
"STATE": "PUBLIC"
2023-07-10 15:32:35 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2023-08-09 07:00:33 +00:00
"value": "In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.\n\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
2023-12-14 15:00:34 +00:00
"value": "CWE-311 Missing Encryption of Sensitive Data",
"cweId": "CWE-311"
2023-08-09 07:00:33 +00:00
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "PHOENIX CONTACT",
"product": {
"product_data": [
{
"product_name": "WP 6070-WVPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
},
{
"product_name": "WP 6101-WXPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
},
{
"product_name": "WP 6121-WXPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
},
{
"product_name": "WP 6156-WHPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
},
{
"product_name": "WP 6185-WHPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
},
{
"product_name": "WP 6215-WHPS",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "0",
"version_value": "4.0.10"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-018/",
"refsource": "MISC",
"name": "https://cert.vde.com/en/advisories/VDE-2023-018/"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "VDE-2023-018",
"defect": [
"CERT@VDE#64468"
],
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
"value": "Gabriele Quagliarella from Nozomi Networks Labs"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
2023-11-14 10:00:33 +00:00
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
2023-08-09 07:00:33 +00:00
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
2023-11-14 10:00:33 +00:00
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
2023-08-09 07:00:33 +00:00
"version": "3.1"
2023-07-10 15:32:35 +00:00
}
]
}
}