Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
References
Link Resource
https://cert.vde.com/en/advisories/VDE-2022-057/ Vendor Advisory
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: CERTVDE

Published: 2022-12-13T07:26:17.752Z

Updated: 2023-01-12T09:48:16.966Z

Reserved: 2022-11-21T11:21:00.430Z


Link: CVE-2022-4098

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-12-13T08:15:10.283

Modified: 2023-03-31T16:12:40.877


Link: CVE-2022-4098

JSON object: View

cve-icon Redhat Information

No data.

CWE