Vulnerabilites related to Phoenix Contact - WHA-GW-F2D2-0-AS- Z2-ETH.EIP
CVE-2021-34564 (GCVE-0-2021-34564)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-17 02:27
Summary
Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.552Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.9",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.9",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-315",
                     description: "CWE-315 Cleartext Storage of Sensitive Information in a Cookie",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:59",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "In WirelessHART-Gateway versions 3.0.9 a vulnerability allows to read and write sensitive data in a cookie",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34564",
               STATE: "PUBLIC",
               TITLE: "In WirelessHART-Gateway versions 3.0.9 a vulnerability allows to read and write sensitive data in a cookie",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "Any cookie-stealing vulnerabilities within the application or browser would enable an attacker to steal the user's credentials to the PEPPERL+FUCHS WirelessHART-Gateway 3.0.9.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-315 Cleartext Storage of Sensitive Information in a Cookie",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34564",
      datePublished: "2021-08-31T10:32:59.626857Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-17T02:27:43.392Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34565 (GCVE-0-2021-34565)
Vulnerability from cvelistv5
Published
2021-08-31 10:33
Modified
2024-09-17 03:22
Severity ?
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
References
Impacted products
Vendor Product Version
Phoenix Contact WHA-GW-F2D2-0-AS- Z2-ETH Version: 3.0.7   < 3.0.7*
Version: 3.0.9   <
Create a notification for this product.
   Phoenix Contact WHA-GW-F2D2-0-AS- Z2-ETH.EIP Version: 3.0.7   < 3.0.7*
Version: 3.0.9   <
Create a notification for this product.
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.412Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThan: "3.0.7*",
                     status: "affected",
                     version: "3.0.7",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "3.0.9",
                     status: "affected",
                     version: "3.0.9",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThan: "3.0.7*",
                     status: "affected",
                     version: "3.0.7",
                     versionType: "custom",
                  },
                  {
                     lessThanOrEqual: "3.0.9",
                     status: "affected",
                     version: "3.0.9",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-798",
                     description: "CWE-798 Use of Hard-coded Credentials",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:33:00",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34565",
               STATE: "PUBLIC",
               TITLE: "In WirelessHART-Gateway versions 3.0.7 to 3.0.9 hard-coded credentials have been found",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_name: "3.0.7",
                                          version_value: "3.0.7",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: ">=",
                                          version_name: "3.0.7",
                                          version_value: "3.0.7",
                                       },
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-798 Use of Hard-coded Credentials",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34565",
      datePublished: "2021-08-31T10:33:00.698044Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-17T03:22:29.106Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-33555 (GCVE-0-2021-33555)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-17 01:36
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-03T23:50:43.056Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.7",
                     status: "affected",
                     version: "3.0.7",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.7",
                     status: "affected",
                     version: "3.0.7",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-22",
                     description: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:52",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-33555",
               STATE: "PUBLIC",
               TITLE: "A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.7",
                                          version_value: "3.0.7",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.7",
                                          version_value: "3.0.7",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-33555",
      datePublished: "2021-08-31T10:32:52.841146Z",
      dateReserved: "2021-05-24T00:00:00",
      dateUpdated: "2024-09-17T01:36:42.946Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34563 (GCVE-0-2021-34563)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-17 04:14
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.
References
Impacted products
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.497Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.8",
                  },
                  {
                     status: "affected",
                     version: "3.0.9",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.8",
                  },
                  {
                     status: "affected",
                     version: "3.0.9",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-1004",
                     description: "CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:58",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34563",
               STATE: "PUBLIC",
               TITLE: "In WirelessHART-Gateway versions 3.0.8 and 3.0.9 the HttpOnly flag is missing in a cookie which allows client-side javascript to modify it",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 and 3.0.9 the HttpOnly attribute is not set on a cookie. This allows the cookie's value to be read or set by client-side JavaScript.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.3,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34563",
      datePublished: "2021-08-31T10:32:58.577856Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-17T04:14:32.706Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34560 (GCVE-0-2021-34560)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-16 23:00
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.418Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.9",
                     status: "affected",
                     version: "3.0.9",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.9",
                     status: "affected",
                     version: "3.0.9",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-522",
                     description: "CWE-522 Insufficiently Protected Credentials",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:55",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34560",
               STATE: "PUBLIC",
               TITLE: "A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.9",
                                          version_value: "3.0.9",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "NONE",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-522 Insufficiently Protected Credentials",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34560",
      datePublished: "2021-08-31T10:32:55.386572Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-16T23:00:54.389Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34559 (GCVE-0-2021-34559)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-16 17:33
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.377Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.8",
                     status: "affected",
                     version: "3.0.8",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.8",
                     status: "affected",
                     version: "3.0.8",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-444",
                     description: "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:53",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "A vulnerability in WirelessHART-Gateway <= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34559",
               STATE: "PUBLIC",
               TITLE: "A vulnerability in WirelessHART-Gateway <= 3.0.8 may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 a vulnerability may allow remote attackers to rewrite links and URLs in cached pages to arbitrary strings.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34559",
      datePublished: "2021-08-31T10:32:54.004163Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-16T17:33:00.268Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34561 (GCVE-0-2021-34561)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-17 01:56
Summary
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.414Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.8",
                     status: "affected",
                     version: "3.0.8",
                     versionType: "custom",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     lessThanOrEqual: "3.0.8",
                     status: "affected",
                     version: "3.0.8",
                     versionType: "custom",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-350",
                     description: "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:56",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "A vulnerability in WirelessHART-Gateway <= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34561",
               STATE: "PUBLIC",
               TITLE: "A vulnerability in WirelessHART-Gateway <= 3.0.8 allows to bypass any IP or firewall based access restrictions through DNS rebinding",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "<=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "HIGH",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 7.5,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34561",
      datePublished: "2021-08-31T10:32:56.470840Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-17T01:56:32.573Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}

CVE-2021-34562 (GCVE-0-2021-34562)
Vulnerability from cvelistv5
Published
2021-08-31 10:32
Modified
2024-09-17 00:56
Summary
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.
References
Show details on NVD website


{
   containers: {
      adp: [
         {
            providerMetadata: {
               dateUpdated: "2024-08-04T00:12:50.405Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_refsource_CONFIRM",
                     "x_transferred",
                  ],
                  url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.8",
                  },
               ],
            },
            {
               product: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
               vendor: "Phoenix Contact",
               versions: [
                  {
                     status: "affected",
                     version: "3.0.8",
                  },
               ],
            },
         ],
         credits: [
            {
               lang: "en",
               value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
            },
         ],
         datePublic: "2021-08-16T00:00:00",
         descriptions: [
            {
               lang: "en",
               value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     cweId: "CWE-79",
                     description: "CWE-79 Cross-site Scripting (XSS)",
                     lang: "en",
                     type: "CWE",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2021-08-31T10:32:57",
            orgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
            shortName: "CERTVDE",
         },
         references: [
            {
               tags: [
                  "x_refsource_CONFIRM",
               ],
               url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
            },
         ],
         solutions: [
            {
               lang: "en",
               value: "No update available.",
            },
         ],
         source: {
            advisory: "VDE-2021-027",
            discovery: "INTERNAL",
         },
         title: "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response",
         workarounds: [
            {
               lang: "en",
               value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
            },
         ],
         x_generator: {
            engine: "Vulnogram 0.0.9",
         },
         x_legacyV4Record: {
            CVE_data_meta: {
               ASSIGNER: "info@cert.vde.com",
               DATE_PUBLIC: "2021-08-16T07:07:00.000Z",
               ID: "CVE-2021-34562",
               STATE: "PUBLIC",
               TITLE: "A vulnerability in WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response",
            },
            affects: {
               vendor: {
                  vendor_data: [
                     {
                        product: {
                           product_data: [
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                              {
                                 product_name: "WHA-GW-F2D2-0-AS- Z2-ETH.EIP",
                                 version: {
                                    version_data: [
                                       {
                                          version_affected: "=",
                                          version_name: "3.0.8",
                                          version_value: "3.0.8",
                                       },
                                    ],
                                 },
                              },
                           ],
                        },
                        vendor_name: "Phoenix Contact",
                     },
                  ],
               },
            },
            credit: [
               {
                  lang: "eng",
                  value: "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.",
               },
            ],
            data_format: "MITRE",
            data_type: "CVE",
            data_version: "4.0",
            description: {
               description_data: [
                  {
                     lang: "eng",
                     value: "In PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 it is possible to inject arbitrary JavaScript into the application's response.",
                  },
               ],
            },
            generator: {
               engine: "Vulnogram 0.0.9",
            },
            impact: {
               cvss: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "NONE",
                  baseScore: 5.4,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "REQUIRED",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
            },
            problemtype: {
               problemtype_data: [
                  {
                     description: [
                        {
                           lang: "eng",
                           value: "CWE-79 Cross-site Scripting (XSS)",
                        },
                     ],
                  },
               ],
            },
            references: {
               reference_data: [
                  {
                     name: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                     refsource: "CONFIRM",
                     url: "https://cert.vde.com/en-us/advisories/vde-2021-027",
                  },
               ],
            },
            solution: [
               {
                  lang: "en",
                  value: "No update available.",
               },
            ],
            source: {
               advisory: "VDE-2021-027",
               discovery: "INTERNAL",
            },
            work_around: [
               {
                  lang: "en",
                  value: "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs).",
               },
            ],
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "270ccfa6-a436-4e77-922e-914ec3a9685c",
      assignerShortName: "CERTVDE",
      cveId: "CVE-2021-34562",
      datePublished: "2021-08-31T10:32:57.523335Z",
      dateReserved: "2021-06-10T00:00:00",
      dateUpdated: "2024-09-17T00:56:48.045Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
}