PHOENIX CONTACT: Improper Privilege Management in WP 6xxx Web panels
CVE-2023-37859
7.2HIGH
Summary
The WP 6xxx series web panels from PHOENIX CONTACT are susceptible to a remote code execution vulnerability due to the SNMP daemon running with root privileges in versions before 4.0.10. If exploited, a remote attacker equipped with the SNMPv2 read/write community string could gain unauthorized root-level access, enabling them to execute arbitrary system commands. This represents a significant risk for organizations utilizing these web panels, highlighting the importance of promptly upgrading to secure versions.
Affected Version(s)
WP 6070-WVPS 0 < 4.0.10
WP 6101-WXPS 0 < 4.0.10
WP 6121-WXPS 0 < 4.0.10
References
CVSS V3.1
Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Gabriele Quagliarella from Nozomi Networks Labs