First published: Wed Aug 09 2023(Updated: )
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.
Credit: info@cert.vde.com info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Wp 6070-wvps Firmware | <4.0.10 | |
Phoenixcontact Wp 6070-wvps | ||
Phoenixcontact Wp 6101-wxps Firmware | <4.0.10 | |
Phoenixcontact Wp 6101-wxps | ||
Phoenixcontact Wp 6121-wxps Firmware | <4.0.10 | |
Phoenixcontact Wp 6121-wxps | ||
Phoenixcontact Wp 6156-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6156-whps | ||
Phoenixcontact Wp 6185-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6185-whps | ||
Phoenixcontact Wp 6215-whps Firmware | <4.0.10 | |
Phoenixcontact Wp 6215-whps |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37860 is a vulnerability in PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10, where a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.
CVE-2023-37860 has a severity rating of 7.5 (high).
PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 are affected by CVE-2023-37860.
An attacker can exploit CVE-2023-37860 by remotely and without authentication obtaining the r/w community string of the SNMPv2 daemon.
Yes, updating to version 4.0.10 or later of PHOENIX CONTACTs WP 6xxx series web panels will fix CVE-2023-37860.