Discover the impact of CVE-2023-37864 on PHOENIX CONTACT's WP 6xxx web panels, allowing remote attackers to gain full device access. Learn how to mitigate this vulnerability.
PHOENIX CONTACT: WP 6xxx Web panels prone to download code without integrity check
Understanding CVE-2023-37864
A vulnerability has been discovered in PHOENIX CONTACT's WP 6xxx series web panels, allowing a remote attacker to gain full access to the device.
What is CVE-2023-37864?
In PHOENIX CONTACT's WP 6xxx series web panels versions prior to 4.0.10, a remote attacker with SNMPv2 write privileges may exploit a special SNMP request to gain full access to the device.
The Impact of CVE-2023-37864
The vulnerability has a CVSS score of 7.2, indicating a high impact on confidentiality, integrity, and availability. This allows an attacker to potentially take full control of the affected device.
Technical Details of CVE-2023-37864
Vulnerability Description
The vulnerability, identified as CWE-494, enables a remote attacker to download code without integrity checks, leading to unauthorized access and manipulation of the device.
Affected Systems and Versions
PHOENIX CONTACT's WP 6xxx series web panels versions less than 4.0.10 are affected by this vulnerability.
Exploitation Mechanism
A remote attacker with SNMPv2 write privileges can exploit a special SNMP request to exploit this vulnerability and gain full access to the device.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Implement network segmentation to isolate critical devices from potential attacks.
Patching and Updates
Regularly monitor and apply security patches released by PHOENIX CONTACT to ensure protection against known vulnerabilities.