Unknown
CVE-2022-4098
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2022-4098
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- com-server ++ firmware,
- com-server 20ma firmware,
- com-server highspeed 100basefx firmware,
- com-server highspeed 100baselx firmware,
- com-server highspeed 19" 1port firmware,
- com-server highspeed 19" 4port firmware,
- com-server highspeed compact firmware,
- com-server highspeed industry firmware,
- com-server highspeed isolated firmware,
- com-server highspeed lc firmware,
- com-server highspeed oem firmware,
- com-server highspeed office 1port firmware,
- com-server highspeed office 4port firmware,
- com-server highspeed poe 3x isolated firmware,
- com-server highspeed poe firmware,
- com-server highspeed ul firmware
References
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: