In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-20247 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server. |
Fixes
Solution
No update available.
Workaround
An external protective measure is required. * Minimize network exposure for affected products and ensure that they are not accessible via the Internet. * Isolate affected products from the corporate network. * If remote access is required, use secure methods such as virtual private networks (VPNs).
References
Link | Providers |
---|---|
https://cert.vde.com/en-us/advisories/vde-2021-027 |
![]() ![]() |
History
Tue, 17 Sep 2024 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway | A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway |

Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:36:42.946Z
Reserved: 2021-05-24T00:00:00
Link: CVE-2021-33555

No data.

Status : Modified
Published: 2021-08-31T11:15:07.277
Modified: 2024-11-21T06:09:05.300
Link: CVE-2021-33555

No data.

No data.