FKIE_CVE-2022-42787
Vulnerability from fkie_nvd - Published: 2022-11-10 12:15 - Updated: 2024-11-21 07:25
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/de/advisories/VDE-2022-043 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/de/advisories/VDE-2022-043 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:at-modem-emulator_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1C1F81-27B4-40D1-A5BD-28A20E85426A",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:at-modem-emulator:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4BCB98-14B9-4B24-AC86-88778BE94A1A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_\\+\\+_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D694696-F36F-48EF-9902-3EC4B17436C3",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_\\+\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "95A959DC-16BA-4F52-BC0E-8C005C00B20B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73EFD090-75E1-4626-83BC-F90C66C492C1",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED79295D-3E94-4396-ADB0-A346B0A2AF63",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A68F28E-5EEF-4318-B146-97F87CA8DEF0",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E7624DA1-E509-4BAA-A44C-BC4E16D9FCB1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65D19EE8-3570-4C87-B8E6-9450FD575587",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B36DF0EE-58C2-4CC4-99C8-55FCDDC9597B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_19\\\"_1port_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04FF98FC-5480-4F36-8257-0622229B55BF",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_19\\\"_1port:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65311BF2-70D2-475B-A314-0465FAA24E7F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_19\\\"_4port_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F211D204-8DF4-436F-97ED-E96439FA1405",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_19\\\"_4port:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0099261-FBC5-4C6D-8558-E7F4BAD401AB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5A39967-43C7-490A-9A4E-8D2304D6F6BB",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F0E0076-658C-49E2-ACEF-A4109A22DEDA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F45FCF96-6419-4BD4-9646-6853E1753571",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E1ACF76-3B54-4960-9A44-19F5CED2216C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB67B2D9-F924-47F1-937B-C6AC5BE63BBC",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53646CB3-FAC9-447B-8762-66E20790041F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48836121-BB41-4E0E-A8F6-085EA12C3EC2",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A47245FC-FDD7-40E6-B78F-28E5902E052D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31849A47-81EE-40F2-986B-67041583E9F4",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*",
"matchCriteriaId": "62A566FD-B617-45DC-B0E8-D130C0BCF13E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DBF947FE-F111-4A2D-A78C-F6CE6139860F",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*",
"matchCriteriaId": "255D4A95-1A11-45F7-B14F-BC74F6D190AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2CA2668-1B7D-48F3-9310-0CE6FA036645",
"versionEndExcluding": "1.76",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0E25680B-D264-4562-B3AB-D6BAF0BEA433",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFE2270-9EFA-4185-860A-BDB6A8024B5D",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0567E35-5011-4C17-8737-A20F55922F59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68BD57D3-8F57-4A94-BD6C-FFD157DE0FFD",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5BB32C-F7B5-4E34-A60A-DDA084EB3F45",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3ABB392-20C8-401E-9968-7A1FB578F07B",
"versionEndExcluding": "1.48",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F851852B-75EA-4F1C-8BFB-DE29394D510B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple W\u0026T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required."
},
{
"lang": "es",
"value": "Productos multiples W\u0026amp;T de Comserver Series utilizan un peque\u00f1o espacio num\u00e9rico para asignar identificadores de sesi\u00f3n. Despu\u00e9s de iniciar sesi\u00f3n de un usuario, un atacante remoto no autenticado puede forzar la identificaci\u00f3n de sesi\u00f3n del usuario y obtener acceso a su cuenta en el dispositivo. Como el usuario necesita iniciar sesi\u00f3n para que el ataque tenga \u00e9xito, se requiere la interacci\u00f3n del usuario."
}
],
"id": "CVE-2022-42787",
"lastModified": "2024-11-21T07:25:20.673",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2022-11-10T12:15:10.927",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://cert.vde.com/de/advisories/VDE-2022-043"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://cert.vde.com/de/advisories/VDE-2022-043"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-330"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-330"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…