Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Wut
Subscribe
|
Com-server 20ma
Subscribe
Com-server 20ma Firmware
Subscribe
Com-server \+\+
Subscribe
Com-server \+\+ Firmware
Subscribe
Com-server Highspeed 100basefx
Subscribe
Com-server Highspeed 100basefx Firmware
Subscribe
Com-server Highspeed 100baselx
Subscribe
Com-server Highspeed 100baselx Firmware
Subscribe
Com-server Highspeed 19\" 1port
Subscribe
Com-server Highspeed 19\" 1port Firmware
Subscribe
Com-server Highspeed 19\" 4port
Subscribe
Com-server Highspeed 19\" 4port Firmware
Subscribe
Com-server Highspeed Compact
Subscribe
Com-server Highspeed Compact Firmware
Subscribe
Com-server Highspeed Industry
Subscribe
Com-server Highspeed Industry Firmware
Subscribe
Com-server Highspeed Isolated
Subscribe
Com-server Highspeed Isolated Firmware
Subscribe
Com-server Highspeed Lc
Subscribe
Com-server Highspeed Lc Firmware
Subscribe
Com-server Highspeed Oem
Subscribe
Com-server Highspeed Oem Firmware
Subscribe
Com-server Highspeed Office 1port
Subscribe
Com-server Highspeed Office 1port Firmware
Subscribe
Com-server Highspeed Office 4port
Subscribe
Com-server Highspeed Office 4port Firmware
Subscribe
Com-server Highspeed Poe
Subscribe
Com-server Highspeed Poe 3x Isolated
Subscribe
Com-server Highspeed Poe 3x Isolated Firmware
Subscribe
Com-server Highspeed Poe Firmware
Subscribe
Com-server Highspeed Ul
Subscribe
Com-server Highspeed Ul Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51468 | Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2022-057/ |
|
History
Mon, 14 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-04-14T18:12:33.668Z
Reserved: 2022-11-21T11:21:00.430Z
Link: CVE-2022-4098
Updated: 2024-08-03T01:27:54.380Z
Status : Modified
Published: 2022-12-13T08:15:10.283
Modified: 2024-11-21T07:34:34.737
Link: CVE-2022-4098
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD