Description
In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.
Published: 2021-05-13
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Weidmüller recommends upgrading affected devices to the current firmware version 1.12.3 or higher which fixes this vulnerability.


Vendor Workaround

Restrict access to the network the device is connected to. Do not directly connect the device to the internet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-8408 In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.
History

No history.

Subscriptions

Weidmueller Iot-gw30 Iot-gw30-4g-eu Iot-gw30-4g-eu Firmware Iot-gw30 Firmware Uc20-wl2000-ac Uc20-wl2000-ac Firmware Uc20-wl2000-iot Uc20-wl2000-iot Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T01:16:17.295Z

Reserved: 2020-12-17T00:00:00.000Z

Link: CVE-2021-20999

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-13T14:15:18.150

Modified: 2024-11-21T05:47:22.467

Link: CVE-2021-20999

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses