First published: Tue Aug 31 2021(Updated: )
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth Firmware | <=3.0.8 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth | ||
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip Firmware | <=3.0.8 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip |
No update available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-34561 is a serious vulnerability in PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 that allows attackers to bypass IP or firewall-based access restrictions using DNS Rebinding.
CVE-2021-34561 affects PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 if the application is not externally accessible or uses IP-based access restrictions.
CVE-2021-34561 has a severity rating of 8.8 (high).
DNS Rebinding is an attack technique where an attacker uses DNS to bypass IP or firewall-based access restrictions by making the victim's browser establish a connection to a malicious website.
You can find more information about CVE-2021-34561 at the following reference: https://cert.vde.com/en-us/advisories/vde-2021-027