Metrics
Affected Vendors & Products
Solution
Gessler GmbH recommends updating EZ2 to 3.2 or greater and WebMaster to 4.4 or greater to mitigate these vulnerabilities. Updates have to be applied by Gessler GmbH technicians. For more information contact Gessler GmbH https://www.gessler.de/en/contact-us/ .
Workaround
No workaround given by the vendor.
Thu, 07 Aug 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-1391 |
Thu, 07 Aug 2025 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device. | Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device. |
Title | Use of weak credentials in Gessler GmbH WEB-MASTER | Use of Hard-coded Credentials in Gessler GmbH WEB-MASTER |
Weaknesses | CWE-798 |
Fri, 08 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-08-07T18:28:32.629Z
Reserved: 2024-01-29T15:59:58.085Z
Link: CVE-2024-1039

Updated: 2024-08-01T18:26:30.395Z

Status : Modified
Published: 2024-02-01T22:15:55.527
Modified: 2025-08-07T19:15:27.800
Link: CVE-2024-1039

No data.

No data.