Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8406 | In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users. |
Solution
The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities. Regardless of the action described above, the vulnerabilities are fixed with following firmware releases: Item number [FW version] 0852-0303 (HW < 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide. 0852-0303 (HW >=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide. 0852-1305 [V1.1.8.S0] 0852-1505 [V1.1.7.S0] 0852-1305/000-001 [V1.1.4.S0] 0852-1505/000-001 [V1.1.4.S0]
Workaround
Disable the web server of the device. Use the CLI interface of the device. Update to the latest firmware. Restrict network access to the device. Do not directly connect the device to the internet.
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-013 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T23:42:19.095Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20997
No data.
Status : Modified
Published: 2021-05-13T14:15:18.077
Modified: 2024-11-21T05:47:22.233
Link: CVE-2021-20997
No data.
OpenCVE Enrichment
No data.
EUVD