CVE-2022-42787 (GCVE-0-2022-42787)
Vulnerability from cvelistv5 – Published: 2022-11-10 11:06 – Updated: 2025-05-01 19:01
VLAI?
Title
Wiesemann & Theis: Small number space for allocating session id in Com-Server family
Summary
Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
Severity ?
8.8 (High)
CWE
- CWE-330 - Use of Insufficiently Random Values
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T13:19:04.509Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/de/advisories/VDE-2022-043"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-42787",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-01T19:01:02.435905Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-01T19:01:20.740Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Com-Server LC",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server PoE 3 x Isolated",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server 20mA",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server ++",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AT-Modem-Emulator",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server UL",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.48",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed 100BaseFX",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed 100BaseLX",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed Office 1 Port",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed Office 4 Port",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed Industry",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed OEM",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed Compact",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed Isolated",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed 19\" 1Port",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed 19\" 4Port",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Com-Server Highspeed PoE",
"vendor": "Wiesemann \u0026 Theis",
"versions": [
{
"lessThan": "1.76",
"status": "affected",
"version": "1.0",
"versionType": "semver"
}
]
}
],
"datePublic": "2022-11-07T10:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple W\u0026amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required."
}
],
"value": "Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required."
}
],
"impacts": [
{
"capecId": "CAPEC-112",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-112 Brute Force"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-330",
"description": "CWE-330 Use of Insufficiently Random Values",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-01T13:56:46.185Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/de/advisories/VDE-2022-043"
}
],
"source": {
"advisory": "VDE-2022-043",
"defect": [
"CERT@VDE#64257"
],
"discovery": "EXTERNAL"
},
"title": "Wiesemann \u0026 Theis: Small number space for allocating session id in Com-Server family",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-42787",
"datePublished": "2022-11-10T11:06:20.856Z",
"dateReserved": "2022-10-11T13:32:19.672Z",
"dateUpdated": "2025-05-01T19:01:20.740Z",
"requesterUserId": "a1e5283b-8f0d-401e-98b2-bc6219c0e8d1",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:at-modem-emulator_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"3D1C1F81-27B4-40D1-A5BD-28A20E85426A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:at-modem-emulator:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C4BCB98-14B9-4B24-AC86-88778BE94A1A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_\\\\+\\\\+_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"6D694696-F36F-48EF-9902-3EC4B17436C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_\\\\+\\\\+:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95A959DC-16BA-4F52-BC0E-8C005C00B20B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"73EFD090-75E1-4626-83BC-F90C66C492C1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED79295D-3E94-4396-ADB0-A346B0A2AF63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"6A68F28E-5EEF-4318-B146-97F87CA8DEF0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7624DA1-E509-4BAA-A44C-BC4E16D9FCB1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"65D19EE8-3570-4C87-B8E6-9450FD575587\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36DF0EE-58C2-4CC4-99C8-55FCDDC9597B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_19\\\\\\\"_1port_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"04FF98FC-5480-4F36-8257-0622229B55BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_19\\\\\\\"_1port:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"65311BF2-70D2-475B-A314-0465FAA24E7F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_19\\\\\\\"_4port_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"F211D204-8DF4-436F-97ED-E96439FA1405\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_19\\\\\\\"_4port:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0099261-FBC5-4C6D-8558-E7F4BAD401AB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"D5A39967-43C7-490A-9A4E-8D2304D6F6BB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0F0E0076-658C-49E2-ACEF-A4109A22DEDA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"F45FCF96-6419-4BD4-9646-6853E1753571\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E1ACF76-3B54-4960-9A44-19F5CED2216C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"BB67B2D9-F924-47F1-937B-C6AC5BE63BBC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"53646CB3-FAC9-447B-8762-66E20790041F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"48836121-BB41-4E0E-A8F6-085EA12C3EC2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A47245FC-FDD7-40E6-B78F-28E5902E052D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"31849A47-81EE-40F2-986B-67041583E9F4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62A566FD-B617-45DC-B0E8-D130C0BCF13E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"DBF947FE-F111-4A2D-A78C-F6CE6139860F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"255D4A95-1A11-45F7-B14F-BC74F6D190AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.76\", \"matchCriteriaId\": \"C2CA2668-1B7D-48F3-9310-0CE6FA036645\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0E25680B-D264-4562-B3AB-D6BAF0BEA433\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"8DFE2270-9EFA-4185-860A-BDB6A8024B5D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0567E35-5011-4C17-8737-A20F55922F59\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"68BD57D3-8F57-4A94-BD6C-FFD157DE0FFD\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C5BB32C-F7B5-4E34-A60A-DDA084EB3F45\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.48\", \"matchCriteriaId\": \"C3ABB392-20C8-401E-9968-7A1FB578F07B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F851852B-75EA-4F1C-8BFB-DE29394D510B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\"}, {\"lang\": \"es\", \"value\": \"Productos multiples W\u0026amp;T de Comserver Series utilizan un peque\\u00f1o espacio num\\u00e9rico para asignar identificadores de sesi\\u00f3n. Despu\\u00e9s de iniciar sesi\\u00f3n de un usuario, un atacante remoto no autenticado puede forzar la identificaci\\u00f3n de sesi\\u00f3n del usuario y obtener acceso a su cuenta en el dispositivo. Como el usuario necesita iniciar sesi\\u00f3n para que el ataque tenga \\u00e9xito, se requiere la interacci\\u00f3n del usuario.\"}]",
"id": "CVE-2022-42787",
"lastModified": "2024-11-21T07:25:20.673",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"info@cert.vde.com\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2022-11-10T12:15:10.927",
"references": "[{\"url\": \"https://cert.vde.com/de/advisories/VDE-2022-043\", \"source\": \"info@cert.vde.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://cert.vde.com/de/advisories/VDE-2022-043\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"info@cert.vde.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-330\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-330\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-42787\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2022-11-10T12:15:10.927\",\"lastModified\":\"2024-11-21T07:25:20.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\"},{\"lang\":\"es\",\"value\":\"Productos multiples W\u0026amp;T de Comserver Series utilizan un peque\u00f1o espacio num\u00e9rico para asignar identificadores de sesi\u00f3n. Despu\u00e9s de iniciar sesi\u00f3n de un usuario, un atacante remoto no autenticado puede forzar la identificaci\u00f3n de sesi\u00f3n del usuario y obtener acceso a su cuenta en el dispositivo. Como el usuario necesita iniciar sesi\u00f3n para que el ataque tenga \u00e9xito, se requiere la interacci\u00f3n del usuario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-330\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:at-modem-emulator_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"3D1C1F81-27B4-40D1-A5BD-28A20E85426A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:at-modem-emulator:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C4BCB98-14B9-4B24-AC86-88778BE94A1A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_\\\\+\\\\+_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"6D694696-F36F-48EF-9902-3EC4B17436C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_\\\\+\\\\+:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95A959DC-16BA-4F52-BC0E-8C005C00B20B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"73EFD090-75E1-4626-83BC-F90C66C492C1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED79295D-3E94-4396-ADB0-A346B0A2AF63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"6A68F28E-5EEF-4318-B146-97F87CA8DEF0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7624DA1-E509-4BAA-A44C-BC4E16D9FCB1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"65D19EE8-3570-4C87-B8E6-9450FD575587\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36DF0EE-58C2-4CC4-99C8-55FCDDC9597B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_19\\\\\\\"_1port_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"04FF98FC-5480-4F36-8257-0622229B55BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_19\\\\\\\"_1port:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"65311BF2-70D2-475B-A314-0465FAA24E7F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_19\\\\\\\"_4port_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"F211D204-8DF4-436F-97ED-E96439FA1405\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_19\\\\\\\"_4port:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0099261-FBC5-4C6D-8558-E7F4BAD401AB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"D5A39967-43C7-490A-9A4E-8D2304D6F6BB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F0E0076-658C-49E2-ACEF-A4109A22DEDA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"F45FCF96-6419-4BD4-9646-6853E1753571\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E1ACF76-3B54-4960-9A44-19F5CED2216C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"BB67B2D9-F924-47F1-937B-C6AC5BE63BBC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53646CB3-FAC9-447B-8762-66E20790041F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"48836121-BB41-4E0E-A8F6-085EA12C3EC2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47245FC-FDD7-40E6-B78F-28E5902E052D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"31849A47-81EE-40F2-986B-67041583E9F4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A566FD-B617-45DC-B0E8-D130C0BCF13E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"DBF947FE-F111-4A2D-A78C-F6CE6139860F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"255D4A95-1A11-45F7-B14F-BC74F6D190AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.76\",\"matchCriteriaId\":\"C2CA2668-1B7D-48F3-9310-0CE6FA036645\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E25680B-D264-4562-B3AB-D6BAF0BEA433\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"8DFE2270-9EFA-4185-860A-BDB6A8024B5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0567E35-5011-4C17-8737-A20F55922F59\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"68BD57D3-8F57-4A94-BD6C-FFD157DE0FFD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C5BB32C-F7B5-4E34-A60A-DDA084EB3F45\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.48\",\"matchCriteriaId\":\"C3ABB392-20C8-401E-9968-7A1FB578F07B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F851852B-75EA-4F1C-8BFB-DE29394D510B\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/de/advisories/VDE-2022-043\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://cert.vde.com/de/advisories/VDE-2022-043\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://cert.vde.com/de/advisories/VDE-2022-043\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T13:19:04.509Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-42787\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-01T19:01:02.435905Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-01T19:01:09.873Z\"}}], \"cna\": {\"title\": \"Wiesemann \u0026 Theis: Small number space for allocating session id in Com-Server family\", \"source\": {\"defect\": [\"CERT@VDE#64257\"], \"advisory\": \"VDE-2022-043\", \"discovery\": \"EXTERNAL\"}, \"impacts\": [{\"capecId\": \"CAPEC-112\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-112 Brute Force\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server LC\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server PoE 3 x Isolated\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server 20mA\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server ++\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"AT-Modem-Emulator\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server UL\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.48\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed 100BaseFX\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed 100BaseLX\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed Office 1 Port\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed Office 4 Port\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed Industry\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed OEM\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed Compact\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed Isolated\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed 19\\\" 1Port\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed 19\\\" 4Port\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Wiesemann \u0026 Theis\", \"product\": \"Com-Server Highspeed PoE\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.0\", \"lessThan\": \"1.76\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2022-11-07T10:00:00.000Z\", \"references\": [{\"url\": \"https://cert.vde.com/de/advisories/VDE-2022-043\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Multiple W\u0026amp;T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-330\", \"description\": \"CWE-330 Use of Insufficiently Random Values\"}]}], \"providerMetadata\": {\"orgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"shortName\": \"CERTVDE\", \"dateUpdated\": \"2022-12-01T13:56:46.185Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-42787\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-01T19:01:20.740Z\", \"dateReserved\": \"2022-10-11T13:32:19.672Z\", \"assignerOrgId\": \"270ccfa6-a436-4e77-922e-914ec3a9685c\", \"datePublished\": \"2022-11-10T11:06:20.856Z\", \"requesterUserId\": \"a1e5283b-8f0d-401e-98b2-bc6219c0e8d1\", \"assignerShortName\": \"CERTVDE\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…