Description
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-41733 | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root. |
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-018/ |
|
History
No history.
Subscriptions
Phoenixcontact
Subscribe
Wp 6070-wvps
Subscribe
Wp 6070-wvps Firmware
Subscribe
Wp 6101-wxps
Subscribe
Wp 6101-wxps Firmware
Subscribe
Wp 6121-wxps
Subscribe
Wp 6121-wxps Firmware
Subscribe
Wp 6156-whps
Subscribe
Wp 6156-whps Firmware
Subscribe
Wp 6185-whps
Subscribe
Wp 6185-whps Firmware
Subscribe
Wp 6215-whps
Subscribe
Wp 6215-whps Firmware
Subscribe
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-08-02T17:23:27.576Z
Reserved: 2023-07-10T07:53:04.115Z
Link: CVE-2023-37859
No data.
Status : Modified
Published: 2023-08-09T07:15:10.827
Modified: 2024-11-21T08:12:20.167
Link: CVE-2023-37859
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD