No analysis available yet.
Vendor Solution
No update available.
Vendor Workaround
An external protective measure is required. * Minimize network exposure for affected products and ensure that they are not accessible via the Internet. * Isolate affected products from the corporate network. * If remote access is required, use secure methods such as virtual private networks (VPNs).
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21211 | In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.8 serious issue exists, if the application is not externally accessible or uses IP-based access restrictions. Attackers can use DNS Rebinding to bypass any IP or firewall based access restrictions that may be in place, by proxying through their target's browser. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-027 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T01:56:32.573Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34561
No data.
Status : Modified
Published: 2021-08-31T11:15:07.467
Modified: 2024-11-21T06:10:41.533
Link: CVE-2021-34561
No data.
OpenCVE Enrichment
No data.
EUVD