CVE-2022-4098
moderate-risk
Published 2022-12-13
Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Do I need to act?
-
0.16% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.0/10
High
ADJACENT_NETWORK
/ LOW complexity
Affected Products (16)
Com-Server \+\+ Firmware
Com-Server 20Ma Firmware
Com-Server Highspeed 100Basefx Firmware
Com-Server Highspeed 100Baselx Firmware
Com-Server Highspeed 19\" 1Port Firmware
Com-Server Highspeed 19\" 4Port Firmware
Com-Server Highspeed Compact Firmware
Com-Server Highspeed Industry Firmware
Com-Server Highspeed Isolated Firmware
Com-Server Highspeed Oem Firmware
Com-Server Highspeed Office 1Port Firmware
Com-Server Highspeed Office 4Port Firmware
Com-Server Highspeed Poe Firmware
Com-Server Highspeed Lc Firmware
Com-Server Highspeed Poe 3X Isolated Firmware
Com-Server Highspeed Ul Firmware
Affected Vendors
References (2)
Vendor Advisory
https://cert.vde.com/en/advisories/VDE-2022-057/
Vendor Advisory
https://cert.vde.com/en/advisories/VDE-2022-057/
44
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
1/34 · Minimal
Exposure
18/34 · Moderate