Lucene search

K
cve[email protected]CVE-2023-3572
HistoryAug 08, 2023 - 7:15 a.m.

CVE-2023-3572

2023-08-0807:15:10
CWE-78
web.nvd.nist.gov
13
cve-2023-3572
phoenix contact
wp 6xxx series
web panels
vulnerability
unauthenticated access
nvd

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.

Affected configurations

NVD
Node
phoenixcontactwp_6070-wvpsMatch-
AND
phoenixcontactwp_6070-wvps_firmwareRange<4.0.10
Node
phoenixcontactwp_6101-wxpsMatch-
AND
phoenixcontactwp_6101-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6121-wxpsMatch-
AND
phoenixcontactwp_6121-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6156-whpsMatch-
AND
phoenixcontactwp_6156-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6185-whpsMatch-
AND
phoenixcontactwp_6185-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6215-whpsMatch-
AND
phoenixcontactwp_6215-whps_firmwareRange<4.0.10

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "WP 6070-WVPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6101-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6121-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6156-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6185-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6215-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.4 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

47.3%

Related for CVE-2023-3572