Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2021-33538: VDE-2021-026 | CERT@VDE

In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.

CVE
#vulnerability#web#dos#rce#perl#buffer_overflow#hard_coded_credentials#auth

2021-06-23 13:04 (CEST) VDE-2021-026

Weidmueller: Multiple vulnerabilities in Industrial WLAN devices (Update A)
Share: Email | Twitter

**

Published

**

2021-06-23 13:04 (CEST)

**

Last update

**

2021-11-09 10:07 (CET)

Vendor(s)

Weidmueller Interface GmbH & Co. KG

Product(s)

Article No°

Product Name

Affected Version(s)

2536600000

IE-WL-BL-AP-CL-EU

<= V1.16.18 (Build 18081617)

2536660000

IE-WL-BL-AP-CL-US

<= V1.16.18 (Build 18081617)

2536650000

IE-WLT-BL-AP-CL-EU

<= V1.16.18 (Build 18081617)

2536670000

IE-WLT-BL-AP-CL-US

<= V1.16.18 (Build 18081617)

2536690000

IE-WLT-VL-AP-BR-CL-EU

<= V1.11.10 (Build 18122616)

2536710000

IE-WLT-VL-AP-BR-CL-US

<= V1.11.10 (Build 18122616)

2536680000

IE-WL-VL-AP-BR-CL-EU

<= V1.11.10 (Build 18122616)

2536700000

IE-WL-VL-AP-BR-CL-US

<= V1.11.10 (Build 18122616)

**

Summary

**

Multiple issues in Weidmueller Industrial WLAN devices have been found.

Initial publication date: 2021-06-23
Update A publication date: 2021-07-02

Update A

CVE-2021-33534

CVSS: 7.2 (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Description: An exploitable command injection vulnerability exists in the hostname functionality of Weidmueller Industrial WLAN devices. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.

**

Vulnerabilities

**

Weakness

Use of Externally-Controlled Format String (CWE-134)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of …

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to …

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected …

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of …

Weakness

Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) (CWE-120)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an …

Weakness

Improper Privilege Management (CWE-269)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the …

Weakness

Improper Adherence to Coding Standards (CWE-710)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the …

Weakness

Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’) (CWE-78)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause …

Weakness

Use of Hard-coded Credentials (CWE-798)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing …

Weakness

Integer Underflow (Wrap or Wraparound) (CWE-191)

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that …

Weakness

Use of Hard-coded Credentials (CWE-798)

Summary

In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from …

Summary

In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected …

**

Solution

**

For all potential vulnerabilities, customers can download a patched firmware to secure their Industrial WLAN devices properly. Please download and install the latest firmware for your device by following the procedure below:
Use the link www.weidmueller.com

  1. Enter within search field on the web page the product number of the Industrial WLAN device you want to update and press “enter”
  2. On next page expand the drop-down menu “Downloads”
  3. Download the respective firmware from the download table
  4. Install the firmware on your device

Find below appropriate patched firmware versions for all affected products.

Product number

Product name

Firmware version

2536600000

IE-WL-BL-AP-CL-EU

<= V1.16.21 (Build 21010513)

2536650000

IE-WLT-BL-AP-CL-EU

2536660000

IE-WL-BL-AP-CL-US

2536670000

IE-WLT-BL-AP-CL-US

2536680000

IE-WL-VL-AP-BR-CL-EU

<= V1.11.13 (Build 21010513)

2536690000

IE-WLT-VL-AP-BR-CL-EU

2536700000

IE-WL-VL-AP-BR-CL-US

2536710000

IE-WLT-VL-AP-BR-CL-US

**

Reported by

**

Reported by Weidmueller.
Coordinated by CERT@VDE.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907