First published: Wed Aug 09 2023(Updated: )
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing to decrypt an encrypted web application login password.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Phoenixcontact Wp 6070-wvps | <4.0.10 | |
Phoenixcontact WP 6070-WVPS | ||
All of | ||
Phoenix Contact WP 6101-WXPS | <4.0.10 | |
Phoenix Contact WP 6101-WXPS | ||
All of | ||
Phoenix Contact Wp 6121-WXPS | <4.0.10 | |
Phoenix Contact Wp 6121-WXPS | ||
All of | ||
Phoenix Contact WP 6156 WHPS | <4.0.10 | |
Phoenix Contact WP 6156 WHPS | ||
All of | ||
Phoenix Contact WP 6185 WHPS Firmware | <4.0.10 | |
Phoenix Contact WP 6185 WHPS | ||
All of | ||
Phoenix Contact Wp 6215 | <4.0.10 | |
Phoenix Contact Wp 6215 | ||
Phoenixcontact Wp 6070-wvps | <4.0.10 | |
Phoenixcontact WP 6070-WVPS | ||
Phoenix Contact WP 6101-WXPS | <4.0.10 | |
Phoenix Contact WP 6101-WXPS | ||
Phoenix Contact Wp 6121-WXPS | <4.0.10 | |
Phoenix Contact Wp 6121-WXPS | ||
Phoenix Contact WP 6156 WHPS | <4.0.10 | |
Phoenix Contact WP 6156 WHPS | ||
Phoenix Contact WP 6185 WHPS Firmware | <4.0.10 | |
Phoenix Contact WP 6185 WHPS | ||
Phoenix Contact Wp 6215 | <4.0.10 | |
Phoenix Contact Wp 6215 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability allows an authenticated remote attacker with admin privileges to read hardcoded cryptographic keys and decrypt an encrypted web application login password.
PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 are affected.
The severity of the vulnerability is medium with a CVSS score of 4.9.
An authenticated remote attacker with admin privileges can exploit the vulnerability to read hardcoded cryptographic keys and decrypt an encrypted web application login password.
More information about the vulnerability can be found at the following reference: https://cert.vde.com/en/advisories/VDE-2023-018/