Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-3573: VDE-2023-018 | CERT@VDE

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.

CVE
#vulnerability#web#dos#hard_coded_credentials#auth#ssl

2023-08-08 08:41 (CEST) VDE-2023-018

PHOENIX CONTACT: Multiple vulnerabilities in WP 6xxx Web panels
Share: Email | Twitter

**

Published

**

2023-08-08 08:41 (CEST)

**

Last update

**

2023-08-08 08:41 (CEST)

Vendor(s)

PHOENIX CONTACT GmbH & Co. KG

Product(s)

Article No°

Product Name

Affected Version(s)

1290800

WP 6070-WVPS

< 4.0.10

1290801

WP 6101-WXPS

< 4.0.10

1290802

WP 6121-WXPS

< 4.0.10

1290803

WP 6156-WHPS

< 4.0.10

1290807

WP 6185-WHPS

< 4.0.10

1290809

WP 6215-WHPS

< 4.0.10

**

Summary

**

Multiple vulnerabilities allow an attacker to read arbitrary files, inject commands and bypass authentication or access control. Furthermore, hardcoded session and encryption keys as well as a missing firmware update signature and a service running with unnecessary privileges were discovered.

**

Vulnerabilities

**

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP POST releated to certificate operations to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a certificate to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.

Last Update

Aug. 8, 2023, 8:43 a.m.

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-connections and might result in a partial denial-of-service.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Download of Code Without Integrity Check (CWE-494)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attackerwith SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Privilege Management (CWE-269)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Externally Controlled Reference to a Resource in Another Sphere (CWE-610)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser .

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Externally Controlled Reference to a Resource in Another Sphere (CWE-610)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt browser.

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Use of Hard-coded Credentials (CWE-798)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. This issue cannot be exploited to bypass the web service authentication of the affected device(s).

Last Update

Aug. 8, 2023, 8:43 a.m.

Weakness

Use of Hard-coded Credentials (CWE-798)

Summary

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.

**

Impact

**

These vulnerabilities allow an attacker to compromise the confidentiality, integrity and availability of the device. An authenticated attacker can gain an administrative shell, execute arbitrary OS commands with administrative privileges, read any files accessible for the “browser” user, craft valid session cookies, decrypt the password for web service, retrieve SNMP communities or craft a malicious firmware update packet.

**

Solution

**

Mitigation

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:

Measures to protect network-capable devices with Ethernet connection

Remediation

Phoenix Contact strongly recommends updating to the latest Firmware Release 4.0.10 or higher, which fixes the above-mentioned vulnerabilities.

**

Reported by

**

This vulnerability was discovered by Gabriele Quagliarella from Nozomi Networks Labs.

We kindly appreciate the coordinated disclosure of this vulnerability by the finder.

PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907