Vulnerabilites related to Weidmüller - IE-WL(T)-BL-AP-CL-XX
CVE-2021-33537 (GCVE-0-2021-33537)
Vulnerability from cvelistv5
Published
2021-06-25 18:26
Modified
2024-09-17 02:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-120 - Buffer Overflow
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.997Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:26:01", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by Remote Code Execution (RCE) vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33537", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by Remote Code Execution (RCE) vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable remote code execution vulnerability exists in the iw_webs configuration parsing functionality. A specially crafted user name entry can cause an overflow of an error message buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-120 Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33537", "datePublished": "2021-06-25T18:26:01.893809Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T02:57:37.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33536 (GCVE-0-2021-33536)
Vulnerability from cvelistv5
Published
2021-06-25 18:26
Modified
2024-09-17 03:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-191 - Integer Underflow (Wrap or Wraparound)
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-191", "description": "CWE-191 Integer Underflow (Wrap or Wraparound)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:26:01", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by Denial-of-Service vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33536", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by Denial-of-Service vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable denial-of-service vulnerability exists in ServiceAgent functionality. A specially crafted packet can cause an integer underflow, triggering a large memcpy that will access unmapped or out-of-bounds memory. An attacker can send this packet while unauthenticated to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-191 Integer Underflow (Wrap or Wraparound)" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33536", "datePublished": "2021-06-25T18:26:01.011824Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T03:38:31.151Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33533 (GCVE-0-2021-33533)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-17 02:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.125Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:58", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33533", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted iw_serverip parameter can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33533", "datePublished": "2021-06-25T18:25:58.364798Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T02:07:08.701Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33528 (GCVE-0-2021-33528)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-16 20:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-710 - Improper Adherence to Coding Standards
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-710", "description": "CWE-710 Improper Adherence to Coding Standards", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:53", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by privilege escalation vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33528", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by privilege escalation vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable privilege escalation vulnerability exists in the iw_console functionality. A specially crafted menu selection string can cause an escape from the restricted console, resulting in system access as the root user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-710 Improper Adherence to Coding Standards" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33528", "datePublished": "2021-06-25T18:25:53.966348Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-16T20:02:22.419Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33531 (GCVE-0-2021-33531)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-16 23:16
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-798 - Use of Hard-coded Credentials
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.986Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:56", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33531", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable use of hard-coded credentials vulnerability exists in multiple iw_* utilities. The device operating system contains an undocumented encryption password, allowing for the creation of custom diagnostic scripts. An attacker can send diagnostic scripts while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798 Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33531", "datePublished": "2021-06-25T18:25:56.622853Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-16T23:16:36.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33530 (GCVE-0-2021-33530)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-17 02:01
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.976Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:55", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33530", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33530", "datePublished": "2021-06-25T18:25:55.735016Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T02:01:49.357Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33539 (GCVE-0-2021-33539)
Vulnerability from cvelistv5
Published
2021-06-25 18:26
Modified
2024-09-16 17:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-287 - Improper Authentication
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.035Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-287", "description": "CWE-287 Improper Authentication", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:26:03", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by authentication bypass vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33539", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by authentication bypass vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable authentication bypass vulnerability exists in the hostname processing. A specially configured device hostname can cause the device to interpret selected remote traffic as local traffic, resulting in a bypass of web authentication. An attacker can send authenticated SNMP requests to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-287 Improper Authentication" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33539", "datePublished": "2021-06-25T18:26:03.815899Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-16T17:43:21.621Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33534 (GCVE-0-2021-33534)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-17 04:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.975Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-02T10:33:06", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33534", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the hostname functionality. A specially crafted entry to network configuration information can cause execution of arbitrary system commands, resulting in full control of the device. An attacker can send various requests while authenticated as a high privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33534", "datePublished": "2021-06-25T18:25:59.235511Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T04:20:16.498Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33535 (GCVE-0-2021-33535)
Vulnerability from cvelistv5
Published
2021-06-25 18:26
Modified
2024-09-17 01:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-134 - Use of Externally-Controlled Format String
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:42.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:26:00", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by exploitable format string vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33535", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by exploitable format string vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable format string vulnerability exists in the iw_console conio_writestr functionality. A specially crafted time server entry can cause an overflow of the time server buffer, resulting in remote code execution. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-134 Use of Externally-Controlled Format String" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33535", "datePublished": "2021-06-25T18:26:00.125539Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T01:15:45.850Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33538 (GCVE-0-2021-33538)
Vulnerability from cvelistv5
Published
2021-06-25 18:26
Modified
2024-09-16 23:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.037Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:26:02", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by improper access control vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33538", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by improper access control vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable improper access control vulnerability exists in the iw_webs account settings functionality. A specially crafted user name entry can cause the overwrite of an existing user account password, resulting in remote shell access to the device as that user. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33538", "datePublished": "2021-06-25T18:26:02.939847Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-16T23:47:04.008Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33532 (GCVE-0-2021-33532)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-17 01:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.067Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:57", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33532", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by OS Command Injection vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in the iw_webs functionality. A specially crafted diagnostic script file name can cause user input to be reflected in a subsequent iw_system call, resulting in remote control over the device. An attacker can send commands while authenticated as a low privilege user to trigger this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33532", "datePublished": "2021-06-25T18:25:57.477465Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-17T01:25:59.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-33529 (GCVE-0-2021-33529)
Vulnerability from cvelistv5
Published
2021-06-25 18:25
Modified
2024-09-16 17:52
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-798 - Use of Hard-coded Credentials
Summary
In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Weidmüller | IE-WL(T)-BL-AP-CL-XX |
Version: IE-WL-BL-AP-CL-EU (2536600000) < Version: IE-WLT-BL-AP-CL-EU (2536650000) < Version: IE-WL-BL-AP-CL-US (2536660000) < Version: IE-WLT-BL-AP-CL-US (2536670000) < |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:50:43.021Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IE-WL(T)-BL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-EU (2536600000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-EU (2536650000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WL-BL-AP-CL-US (2536660000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.16.18 (Build 18081617)", "status": "affected", "version": "IE-WLT-BL-AP-CL-US (2536670000)", "versionType": "custom" } ] }, { "product": "IE-WL(T)-VL-AP-CL-XX", "vendor": "Weidm\u00fcller", "versions": [ { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WL-VL-AP-BR-CL-US (2536700000)", "versionType": "custom" }, { "lessThanOrEqual": "V1.11.10 (Build 18122616)", "status": "affected", "version": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "versionType": "custom" } ] } ], "datePublic": "2021-06-23T00:00:00", "descriptions": [ { "lang": "en", "value": "In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-798", "description": "CWE-798 Use of Hard-coded Credentials", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-25T18:25:54", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ], "solutions": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" }, "title": "WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-33529", "STATE": "PUBLIC", "TITLE": "WEIDMUELLER: WLAN devices affected by Hard-coded Credentials vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "IE-WL(T)-BL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-EU (2536600000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-EU (2536650000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-BL-AP-CL-US (2536660000)", "version_value": "V1.16.18 (Build 18081617)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-BL-AP-CL-US (2536670000)", "version_value": "V1.16.18 (Build 18081617)" } ] } }, { "product_name": "IE-WL(T)-VL-AP-CL-XX", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-EU (2536680000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-EU (2536690000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WL-VL-AP-BR-CL-US (2536700000)", "version_value": "V1.11.10 (Build 18122616)" }, { "version_affected": "\u003c=", "version_name": "IE-WLT-VL-AP-BR-CL-US (2536710000)", "version_value": "V1.11.10 (Build 18122616)" } ] } } ] }, "vendor_name": "Weidm\u00fcller" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Weidmueller Industrial WLAN devices in multiple versions the usage of hard-coded cryptographic keys within the service agent binary allows for the decryption of captured traffic across the network from or to the device." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-798 Use of Hard-coded Credentials" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-026", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-026" } ] }, "solution": [ { "lang": "en", "value": "For IE-WL(T)-BL-AP-CL-XX versions V1.16.21 (Build 21010513) and greater are fixed.\nFor IE-WL(T)-VL-AP-CL-XX versions V1.11.13 (Build 21010513) and greater are fixed." } ], "source": { "advisory": "VDE-2021-026", "defect": [ "VDE-2021-026" ], "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-33529", "datePublished": "2021-06-25T18:25:54.843420Z", "dateReserved": "2021-05-24T00:00:00", "dateUpdated": "2024-09-16T17:52:51.853Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }