In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8408 | In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped. |
Fixes
Solution
Weidmüller recommends upgrading affected devices to the current firmware version 1.12.3 or higher which fixes this vulnerability.
Workaround
Restrict access to the network the device is connected to. Do not directly connect the device to the internet.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-016 |
|
History
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:16:17.295Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-20999
No data.
Status : Modified
Published: 2021-05-13T14:15:18.150
Modified: 2024-11-21T05:47:22.467
Link: CVE-2021-20999
No data.
OpenCVE Enrichment
No data.
EUVD