First published: Tue Aug 31 2021(Updated: )
In PEPPERL+FUCHS WirelessHART-Gateway 3.0.7 to 3.0.9 the SSH and telnet services are active with hard-coded credentials.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth Firmware | >=3.0.7<=3.0.9 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth | ||
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip Firmware | >=3.0.7<=3.0.9 | |
Pepperl-fuchs Wha-gw-f2d2-0-as-z2-eth.eip |
No update available.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-34565.
The severity of CVE-2021-34565 is critical with a severity value of 9.8.
PEPPERL+FUCHS WirelessHART-Gateway versions 3.0.7 to 3.0.9 are affected by CVE-2021-34565.
Yes, the SSH and telnet services are active in PEPPERL+FUCHS WirelessHART-Gateway versions 3.0.7 to 3.0.9.
Yes, there are hard-coded credentials associated with CVE-2021-34565.
You can find more information about CVE-2021-34565 by visiting the reference link provided: https://cert.vde.com/en-us/advisories/vde-2021-027.
The CWE ID for CVE-2021-34565 is CWE-798.