Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41731 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-018/ |
|
Tue, 08 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-10-08T14:56:47.591Z
Reserved: 2023-07-10T07:53:04.115Z
Link: CVE-2023-37857
Updated: 2024-08-02T17:23:26.887Z
Status : Modified
Published: 2023-08-09T07:15:10.603
Modified: 2024-11-21T08:12:19.860
Link: CVE-2023-37857
No data.
OpenCVE Enrichment
No data.
EUVD