CVE-2022-4098

Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wut:com-server_\+\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_\+\+:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_1port:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_4port:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:34

Type Values Removed Values Added
References () https://cert.vde.com/en/advisories/VDE-2022-057/ - Vendor Advisory () https://cert.vde.com/en/advisories/VDE-2022-057/ - Vendor Advisory

Information

Published : 2022-12-13 08:15

Updated : 2024-11-21 07:34


NVD link : CVE-2022-4098

Mitre link : CVE-2022-4098

CVE.ORG link : CVE-2022-4098


JSON object : View

Products Affected

wut

  • com-server_highspeed_oem_firmware
  • com-server_highspeed_isolated
  • com-server_highspeed_office_1port_firmware
  • com-server_highspeed_100baselx_firmware
  • com-server_highspeed_19\"_1port_firmware
  • com-server_highspeed_100baselx
  • com-server_highspeed_lc
  • com-server_highspeed_poe_3x_isolated_firmware
  • com-server_highspeed_industry
  • com-server_highspeed_office_1port
  • com-server_highspeed_lc_firmware
  • com-server_highspeed_compact_firmware
  • com-server_highspeed_100basefx
  • com-server_highspeed_industry_firmware
  • com-server_\+\+_firmware
  • com-server_highspeed_ul_firmware
  • com-server_highspeed_oem
  • com-server_highspeed_isolated_firmware
  • com-server_highspeed_compact
  • com-server_highspeed_19\"_1port
  • com-server_highspeed_ul
  • com-server_\+\+
  • com-server_highspeed_office_4port_firmware
  • com-server_highspeed_office_4port
  • com-server_20ma_firmware
  • com-server_highspeed_19\"_4port
  • com-server_highspeed_poe_firmware
  • com-server_highspeed_100basefx_firmware
  • com-server_highspeed_poe
  • com-server_highspeed_poe_3x_isolated
  • com-server_20ma
  • com-server_highspeed_19\"_4port_firmware
CWE
CWE-290

Authentication Bypass by Spoofing