First published: Wed Aug 09 2023(Updated: )
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Wp 6070-wvps | <4.0.10 | |
Phoenixcontact WP 6070-WVPS | ||
Phoenix Contact WP 6101-WXPS | <4.0.10 | |
Phoenix Contact WP 6101-WXPS | ||
Phoenix Contact Wp 6121-WXPS | <4.0.10 | |
Phoenix Contact Wp 6121-WXPS | ||
Phoenix Contact WP 6156 WHPS | <4.0.10 | |
Phoenix Contact WP 6156 WHPS | ||
Phoenix Contact WP 6185 WHPS Firmware | <4.0.10 | |
Phoenix Contact WP 6185 WHPS | ||
Phoenix Contact Wp 6215 | <4.0.10 | |
Phoenix Contact Wp 6215 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this PHOENIX CONTACT WP web panels vulnerability is CVE-2023-37864.
The severity of CVE-2023-37864 is high with a severity value of 7.2.
The affected software for CVE-2023-37864 is PHOENIX CONTACT WP 6xxx series web panels in versions prior to 4.0.10.
A remote attacker with SNMPv2 write privileges can exploit CVE-2023-37864 using a special SNMP request to gain full access to the device.
To fix CVE-2023-37864, update PHOENIX CONTACT WP 6xxx series web panels to version 4.0.10 or later.