CVE-2022-42787
high-risk
Published 2022-11-10
Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
Do I need to act?
-
0.91% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
8
CVSS 8.8/10
High
NETWORK
/ LOW complexity
Affected Products (17)
At-Modem-Emulator Firmware
Com-Server \+\+ Firmware
Com-Server 20Ma Firmware
Com-Server Highspeed 100Basefx Firmware
Com-Server Highspeed 100Baselx Firmware
Com-Server Highspeed 19\" 1Port Firmware
Com-Server Highspeed 19\" 4Port Firmware
Com-Server Highspeed Compact Firmware
Com-Server Highspeed Industry Firmware
Com-Server Highspeed Isolated Firmware
Com-Server Highspeed Oem Firmware
Com-Server Highspeed Office 1Port Firmware
Com-Server Highspeed Office 4Port Firmware
Com-Server Highspeed Poe Firmware
Com-Server Highspeed Lc Firmware
Com-Server Highspeed Ul Firmware
Com-Server Highspeed Poe 3X Isolated Firmware
Affected Vendors
References (2)
Vendor Advisory
https://cert.vde.com/de/advisories/VDE-2022-043
Vendor Advisory
https://cert.vde.com/de/advisories/VDE-2022-043
52
/ 100
high-risk
Severity
30/34 · Critical
Exploitability
3/34 · Minimal
Exposure
19/34 · Moderate