First published: Wed Aug 09 2023(Updated: )
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.
Credit: info@cert.vde.com info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Wp 6070-wvps Firmware | <4.0.10 | |
Phoenixcontact Wp 6070-wvps | ||
Phoenixcontact Wp 6101-wxps Firmware | <4.0.10 | |
Phoenixcontact Wp 6101-wxps | ||
Phoenixcontact Wp 6121-wxps Firmware | <4.0.10 | |
Phoenixcontact Wp 6121-wxps | ||
Phoenixcontact Wp 6156-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6156-whps | ||
Phoenixcontact Wp 6185-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6185-whps | ||
Phoenixcontact Wp 6215-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6215-whps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37857 is a vulnerability in PHOENIX CONTACT's WP 6xxx series web panels that allows an authenticated remote attacker with admin privileges to read hardcoded cryptographic keys and create valid session cookies.
CVE-2023-37857 has a severity rating of 7.2 (high).
Versions prior to 4.0.10 of PHOENIX CONTACT's WP 6xxx series web panels are affected by CVE-2023-37857.
An attacker with admin privileges can exploit CVE-2023-37857 to read hardcoded cryptographic keys and create valid session cookies, potentially bypassing web service authentication.
Updating PHOENIX CONTACT's WP 6xxx series web panels to version 4.0.10 or later will fix CVE-2023-37857.