Description
In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.
No analysis available yet.
Remediation
Vendor Solution
Weidmüller recommends upgrading affected devices to the current firmware version 1.12.3 or higher which fixes this vulnerability.
Vendor Workaround
Restrict access to the network the device is connected to. Do not directly connect the device to the internet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8408 | In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped. |
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-016 |
|
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:16:17.295Z
Reserved: 2020-12-17T00:00:00.000Z
Link: CVE-2021-20999
No data.
Status : Modified
Published: 2021-05-13T14:15:18.150
Modified: 2024-11-21T05:47:22.467
Link: CVE-2021-20999
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD