CVE-2023-37857
PHOENIX CONTACT: Use of Hard-coded Credentials in WP 6xxx Web panels
Severity Score
7.2
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track
*SSVC
Descriptions
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.
*Credits:
Gabriele Quagliarella from Nozomi Networks Labs
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-07-10 CVE Reserved
- 2023-08-09 CVE Published
- 2024-08-15 EPSS Updated
- 2024-10-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-798: Use of Hard-coded Credentials
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://cert.vde.com/en/advisories/VDE-2023-018 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6070-wvps Firmware Search vendor "Phoenixcontact" for product "Wp 6070-wvps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6070-wvps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6070-wvps Search vendor "Phoenixcontact" for product "Wp 6070-wvps" | - | - |
Safe
|
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6101-wxps Firmware Search vendor "Phoenixcontact" for product "Wp 6101-wxps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6101-wxps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6101-wxps Search vendor "Phoenixcontact" for product "Wp 6101-wxps" | - | - |
Safe
|
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6121-wxps Firmware Search vendor "Phoenixcontact" for product "Wp 6121-wxps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6121-wxps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6121-wxps Search vendor "Phoenixcontact" for product "Wp 6121-wxps" | - | - |
Safe
|
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6156-whps Firmware Search vendor "Phoenixcontact" for product "Wp 6156-whps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6156-whps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6156-whps Search vendor "Phoenixcontact" for product "Wp 6156-whps" | - | - |
Safe
|
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6185-whps Firmware Search vendor "Phoenixcontact" for product "Wp 6185-whps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6185-whps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6185-whps Search vendor "Phoenixcontact" for product "Wp 6185-whps" | - | - |
Safe
|
Phoenixcontact Search vendor "Phoenixcontact" | Wp 6215-whps Firmware Search vendor "Phoenixcontact" for product "Wp 6215-whps Firmware" | < 4.0.10 Search vendor "Phoenixcontact" for product "Wp 6215-whps Firmware" and version " < 4.0.10" | - |
Affected
| in | Phoenixcontact Search vendor "Phoenixcontact" | Wp 6215-whps Search vendor "Phoenixcontact" for product "Wp 6215-whps" | - | - |
Safe
|