In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-41731 In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated, remote attacker with admin privileges is able to read hardcoded cryptographic keys allowing the attacker to create valid session cookies. These session-cookies created by the attacker are not sufficient to obtain a valid session on the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 08 Oct 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-10-08T14:56:47.591Z

Reserved: 2023-07-10T07:53:04.115Z

Link: CVE-2023-37857

cve-icon Vulnrichment

Updated: 2024-08-02T17:23:26.887Z

cve-icon NVD

Status : Modified

Published: 2023-08-09T07:15:10.603

Modified: 2024-11-21T08:12:19.860

Link: CVE-2023-37857

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.