First published: Mon Aug 16 2021(Updated: )
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth Firmware | <=3.0.9 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth | ||
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip Firmware | <=3.0.9 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip |
No update available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34560.
The severity level of CVE-2021-34560 is medium (5.5).
CVE-2021-34560 allows an attacker to capture stored credentials on a user's computer if they have control over it.
To fix CVE-2021-34560, update PEPPERL+FUCHS WirelessHART-Gateway to version 3.0.10 or higher to disable autocomplete on the password field.
You can find more information about CVE-2021-34560 at the following reference: https://cert.vde.com/en-us/advisories/vde-2021-027