2023-08-08 08:00:30 +00:00
{
"id" : "CVE-2023-3573" ,
"sourceIdentifier" : "info@cert.vde.com" ,
"published" : "2023-08-08T07:15:10.957" ,
2023-08-25 08:00:29 +00:00
"lastModified" : "2023-08-25T07:15:08.990" ,
"vulnStatus" : "Modified" ,
2023-08-08 08:00:30 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations\u00a0to gain full access to the device."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2023-08-25 08:00:29 +00:00
"source" : "info@cert.vde.com" ,
2023-08-08 08:00:30 +00:00
"type" : "Primary" ,
2023-08-10 20:00:35 +00:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
} ,
{
2023-08-25 08:00:29 +00:00
"source" : "nvd@nist.gov" ,
2023-08-10 20:00:35 +00:00
"type" : "Secondary" ,
2023-08-08 08:00:30 +00:00
"cvssData" : {
"version" : "3.1" ,
2023-08-25 08:00:29 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
2023-08-08 08:00:30 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
2023-08-25 08:00:29 +00:00
"scope" : "UNCHANGED" ,
2023-08-08 08:00:30 +00:00
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
2023-08-25 08:00:29 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
2023-08-08 08:00:30 +00:00
} ,
2023-08-25 08:00:29 +00:00
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2023-08-08 08:00:30 +00:00
}
]
} ,
"weaknesses" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-78"
}
]
}
] ,
2023-08-10 20:00:35 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "30A330AB-B871-4312-927A-BF73D745DFD1"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6070-wvps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7746DBEC-655D-4405-B457-202342434B49"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "E4F5E047-4212-498C-8C8A-4454C53A34DD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6101-wxps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "04FBD160-0582-4049-B6F2-7A56CC056FF2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "75E09A8E-A36E-4E5D-A62F-A8DABAB4258F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6121-wxps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "206E4626-E7B8-4744-A258-9B9941652018"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "1859A631-9C2E-4AA6-BFA1-7DE9E779BD6E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6156-whps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DF6A8F5-E997-4B75-BB55-4C77BE3011F6"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "D2329179-AE02-4B31-A5FD-BD6E205726F7"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6185-whps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3C60EBBD-552C-48AB-975E-C3B7D3009CC7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "4.0.10" ,
"matchCriteriaId" : "D743C23B-054C-4F62-BCFB-BE90CF53832E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:wp_6215-whps:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6CCE4E8-7EDF-44E9-8ED7-3FB88256674F"
}
]
}
]
}
] ,
2023-08-08 08:00:30 +00:00
"references" : [
{
"url" : "https://cert.vde.com/en/advisories/VDE-2023-018/" ,
2023-08-10 20:00:35 +00:00
"source" : "info@cert.vde.com" ,
"tags" : [
"Third Party Advisory"
]
2023-08-08 08:00:30 +00:00
}
]
}