Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-44223 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-018/ |
|
Tue, 15 Oct 2024 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-10-15T19:18:16.801Z
Reserved: 2023-07-10T07:53:13.476Z
Link: CVE-2023-3572
Updated: 2024-08-02T07:01:55.922Z
Status : Modified
Published: 2023-08-08T07:15:10.840
Modified: 2024-11-21T08:17:34.587
Link: CVE-2023-3572
No data.
OpenCVE Enrichment
No data.
EUVD