Learn about CVE-2023-3573, a critical vulnerability in PHOENIX CONTACT's WP 6xxx web panels allowing remote command injection. With a CVSS score of 8.8, this flaw poses a high risk.
This CVE-2023-3573 involves a vulnerability in PHOENIX CONTACT's WP 6xxx series web panels, specifically affecting versions prior to 4.0.10. It allows a remote attacker with low privileges to execute a command injection through a HTTP POST request related to font configuration operations, potentially gaining full access to the device.
Understanding CVE-2023-3573
This section delves into the details of the CVE-2023-3573 vulnerability, its impact, technical aspects, and mitigation strategies.
What is CVE-2023-3573?
The CVE-2023-3573 vulnerability in PHOENIX CONTACT's WP 6xxx web panels enables a remote attacker with limited privileges to exploit a command injection flaw, leading to unauthorized access to the device. This could result in severe consequences for affected systems.
The Impact of CVE-2023-3573
With a CVSS v3.1 base score of 8.8, this vulnerability poses a high risk, particularly affecting confidentiality, integrity, and availability. A successful attack could allow threat actors to take complete control of the device, compromising sensitive data and system operations.
Technical Details of CVE-2023-3573
This section outlines the technical specifics of the vulnerability, including how it can be exploited and the systems and versions affected.
Vulnerability Description
The vulnerability arises from improper neutralization of special elements in an OS command (OS Command Injection), allowing attackers to execute commands via HTTP POST requests pertaining to font configuration operations.
Affected Systems and Versions
The impacted systems include PHOENIX CONTACT's WP 6xxx series web panels with versions prior to 4.0.10. Specifically, the vulnerability affects versions 0 of the mentioned products.
Exploitation Mechanism
The vulnerability can be exploited by a remote attacker with low privileges leveraging a command injection technique in HTTP POST requests associated with font configuration operations.
Mitigation and Prevention
In response to CVE-2023-3573, prompt action is crucial to safeguard systems against potential exploitation and unauthorized access.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
PHOENIX CONTACT has released version 4.0.10 to address the vulnerability. It is recommended that users of the WP 6xxx series web panels update to this version to eliminate the risk posed by CVE-2023-3573.