CVE-2022-4098

Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
References
Link Resource
https://cert.vde.com/en/advisories/VDE-2022-057/ Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:wut:com-server_\+\+_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_\+\+:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:wut:com-server_20ma_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_20ma:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100basefx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100basefx:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_100baselx_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_100baselx:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_1port:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_19\"_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_19\"_4port:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_compact_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_compact:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_industry_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_industry:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_isolated:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_oem_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_oem:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_1port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_1port:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_office_4port_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_office_4port:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_lc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_lc:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_poe_3x_isolated_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_poe_3x_isolated:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:wut:com-server_highspeed_ul_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:wut:com-server_highspeed_ul:-:*:*:*:*:*:*:*

Information

Published : 2022-12-13 00:15

Updated : 2023-01-12 02:15


NVD link : CVE-2022-4098

Mitre link : CVE-2022-4098


JSON object : View

CWE
CWE-290

Authentication Bypass by Spoofing

Advertisement

dedicated server usa

Products Affected

wut

  • com-server_\+\+_firmware
  • com-server_highspeed_100basefx
  • com-server_highspeed_isolated_firmware
  • com-server_highspeed_office_4port_firmware
  • com-server_highspeed_industry
  • com-server_highspeed_ul_firmware
  • com-server_highspeed_oem_firmware
  • com-server_highspeed_poe
  • com-server_highspeed_19\"_4port_firmware
  • com-server_highspeed_isolated
  • com-server_highspeed_19\"_4port
  • com-server_highspeed_office_4port
  • com-server_highspeed_office_1port
  • com-server_highspeed_poe_firmware
  • com-server_highspeed_19\"_1port_firmware
  • com-server_highspeed_19\"_1port
  • com-server_highspeed_oem
  • com-server_highspeed_compact
  • com-server_20ma
  • com-server_highspeed_100baselx
  • com-server_highspeed_poe_3x_isolated
  • com-server_highspeed_ul
  • com-server_highspeed_poe_3x_isolated_firmware
  • com-server_20ma_firmware
  • com-server_highspeed_100baselx_firmware
  • com-server_highspeed_100basefx_firmware
  • com-server_highspeed_lc_firmware
  • com-server_highspeed_industry_firmware
  • com-server_highspeed_compact_firmware
  • com-server_highspeed_office_1port_firmware
  • com-server_\+\+
  • com-server_highspeed_lc