Discover the impact of CVE-2021-34562, a medium severity vulnerability in Phoenix Contact's WHA-GW-F2D2-0-AS- Z2-ETH products, allowing arbitrary JavaScript injection.
A vulnerability in PEPPERL+FUCHS WirelessHART-Gateway 3.0.8 allows for arbitrary JavaScript injection into the application's response.
Understanding CVE-2021-34562
This CVE-2021-34562 impacts Phoenix Contact's WHA-GW-F2D2-0-AS- Z2-ETH and WHA-GW-F2D2-0-AS- Z2-ETH.EIP products.
What is CVE-2021-34562?
The vulnerability in WirelessHART-Gateway 3.0.8 enables the injection of arbitrary JavaScript into the application's response, as reported by Pepperl+Fuchs.
The Impact of CVE-2021-34562
With a CVSS base score of 5.4, this medium severity vulnerability requires user interaction and can lead to low confidentiality and integrity impacts.
Technical Details of CVE-2021-34562
The following technical details outline the specifics of this vulnerability:
Vulnerability Description
The CVE-2021-34562 vulnerability allows attackers to inject arbitrary JavaScript code into the WirelessHART-Gateway 3.0.8 response.
Affected Systems and Versions
Phoenix Contact's WHA-GW-F2D2-0-AS- Z2-ETH and WHA-GW-F2D2-0-AS- Z2-ETH.EIP versions 3.0.8 are affected by this vulnerability.
Exploitation Mechanism
Attackers can exploit this vulnerability over a network with low complexity, no privileges required, and user interaction.
Mitigation and Prevention
To safeguard against CVE-2021-34562, consider the following measures:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
As of now, there are no available updates to address this vulnerability.