Lucene search

K
cve[email protected]CVE-2023-37855
HistoryAug 09, 2023 - 7:15 a.m.

CVE-2023-37855

2023-08-0907:15:10
CWE-610
web.nvd.nist.gov
31
cve-2023-37855
phoenix contact
web panels
security vulnerability
filesystem access

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.2%

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt browser.

Affected configurations

NVD
Node
phoenixcontactwp_6070-wvpsMatch-
AND
phoenixcontactwp_6070-wvps_firmwareRange<4.0.10
Node
phoenixcontactwp_6101-wxpsMatch-
AND
phoenixcontactwp_6101-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6121-wxpsMatch-
AND
phoenixcontactwp_6121-wxps_firmwareRange<4.0.10
Node
phoenixcontactwp_6156-whpsMatch-
AND
phoenixcontactwp_6156-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6185-whpsMatch-
AND
phoenixcontactwp_6185-whps_firmwareRange<4.0.10
Node
phoenixcontactwp_6215-whpsMatch-
AND
phoenixcontactwp_6215-whps_firmwareRange<4.0.10

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "WP 6070-WVPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6101-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6121-WXPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6156-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6185-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "WP 6215-WHPS",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "4.0.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

4.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.2%

Related for CVE-2023-37855