In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-20230 In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
Fixes

Solution

For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed. For IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T23:47:04.008Z

Reserved: 2021-05-24T00:00:00

Link: CVE-2021-33538

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-25T19:15:09.570

Modified: 2024-11-21T06:09:02.410

Link: CVE-2021-33538

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.