First published: Wed Aug 09 2023(Updated: )
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser .
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Wp 6070-wvps | <4.0.10 | |
Phoenixcontact WP 6070-WVPS | ||
Phoenix Contact WP 6101-WXPS | <4.0.10 | |
Phoenix Contact WP 6101-WXPS | ||
Phoenix Contact Wp 6121-WXPS | <4.0.10 | |
Phoenix Contact Wp 6121-WXPS | ||
Phoenix Contact WP 6156 WHPS | <4.0.10 | |
Phoenix Contact WP 6156 WHPS | ||
Phoenix Contact WP 6185 WHPS Firmware | <4.0.10 | |
Phoenix Contact WP 6185 WHPS | ||
Phoenix Contact Wp 6215 | <4.0.10 | |
Phoenix Contact Wp 6215 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-37856.
The severity of CVE-2023-37856 is medium with a severity value of 4.3.
PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 are affected by CVE-2023-37856.
A remote attacker with low privileges can gain limited read-access to the device-filesystem through a configuration dialog within the embedded Qt browser in PHOENIX CONTACTs WP 6xxx series web panels.
Yes, updating to version 4.0.10 or newer of the PHOENIX CONTACTs WP 6xxx series web panels firmware will fix the vulnerability.