CVE-2022-42785

Multiple W&T products of the ComServer Series are prone to an authentication bypass. An unathenticated remote attacker, can log in without knowledge of the password by crafting a modified HTTP GET Request.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wut:at-modem-emulator_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:at-modem-emulator:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wut:com-server_\+\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_\+\+:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_1port:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_4port:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:25

Type Values Removed Values Added
References () https://cert.vde.com/de/advisories/VDE-2022-043/ - Third Party Advisory () https://cert.vde.com/de/advisories/VDE-2022-043/ - Third Party Advisory

Information

Published : 2022-11-15 21:15

Updated : 2024-11-21 07:25


NVD link : CVE-2022-42785

Mitre link : CVE-2022-42785

CVE.ORG link : CVE-2022-42785


JSON object : View

Products Affected

wut

  • com-server_highspeed_oem_firmware
  • com-server_highspeed_isolated
  • com-server_highspeed_office_1port_firmware
  • com-server_highspeed_100baselx_firmware
  • com-server_highspeed_19\"_1port_firmware
  • com-server_highspeed_100baselx
  • com-server_highspeed_lc
  • at-modem-emulator_firmware
  • com-server_highspeed_poe_3x_isolated_firmware
  • com-server_highspeed_industry
  • com-server_highspeed_office_1port
  • com-server_highspeed_lc_firmware
  • com-server_highspeed_compact_firmware
  • com-server_highspeed_100basefx
  • com-server_highspeed_industry_firmware
  • com-server_\+\+_firmware
  • com-server_highspeed_ul_firmware
  • com-server_highspeed_oem
  • com-server_highspeed_isolated_firmware
  • com-server_highspeed_compact
  • com-server_highspeed_19\"_1port
  • com-server_highspeed_ul
  • at-modem-emulator
  • com-server_\+\+
  • com-server_highspeed_office_4port_firmware
  • com-server_highspeed_office_4port
  • com-server_20ma_firmware
  • com-server_highspeed_19\"_4port
  • com-server_highspeed_poe_firmware
  • com-server_highspeed_100basefx_firmware
  • com-server_highspeed_poe
  • com-server_highspeed_poe_3x_isolated
  • com-server_20ma
  • com-server_highspeed_19\"_4port_firmware
CWE
CWE-306

Missing Authentication for Critical Function