HIGH · 7.2

CVE-2023-37859

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string t...

Vulnerability Description

In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string to execute system commands as root.

CVSS Score

7.2

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
PhoenixcontactWp 6070-Wvps Firmware< 4.0.10
PhoenixcontactWp 6070-Wvps-
PhoenixcontactWp 6101-Wxps Firmware< 4.0.10
PhoenixcontactWp 6101-Wxps-
PhoenixcontactWp 6121-Wxps Firmware< 4.0.10
PhoenixcontactWp 6121-Wxps-
PhoenixcontactWp 6156-Whps Firmware< 4.0.10
PhoenixcontactWp 6156-Whps-
PhoenixcontactWp 6185-Whps Firmware< 4.0.10
PhoenixcontactWp 6185-Whps-
PhoenixcontactWp 6215-Whps Firmware< 4.0.10
PhoenixcontactWp 6215-Whps-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-37859?

CVE-2023-37859 is a vulnerability with a CVSS score of 7.2 (HIGH). In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string t...

How severe is CVE-2023-37859?

CVE-2023-37859 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-37859?

Check the references section above for vendor advisories and patch information. Affected products include: Phoenixcontact Wp 6070-Wvps Firmware, Phoenixcontact Wp 6070-Wvps, Phoenixcontact Wp 6101-Wxps Firmware, Phoenixcontact Wp 6101-Wxps, Phoenixcontact Wp 6121-Wxps Firmware.