Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-20247 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server. |
Solution
No update available.
Workaround
An external protective measure is required. * Minimize network exposure for affected products and ensure that they are not accessible via the Internet. * Isolate affected products from the corporate network. * If remote access is required, use secure methods such as virtual private networks (VPNs).
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 |
|
Tue, 17 Sep 2024 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway | A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:36:42.946Z
Reserved: 2021-05-24T00:00:00
Link: CVE-2021-33555
No data.
Status : Modified
Published: 2021-08-31T11:15:07.277
Modified: 2024-11-21T06:09:05.300
Link: CVE-2021-33555
No data.
OpenCVE Enrichment
No data.
EUVD