A vulnerability may allow remote attackers to read arbitrary files on the server of the WirelessHART-Gateway
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.7 the filename parameter is vulnerable to unauthenticated path traversal attacks, enabling read access to arbitrary files on the server.
Description: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Metrics
Version
Base score
Base severity
Vector
3.1
7.5
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version:3.1
Base score:7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
No update available.
Configurations
Workarounds
An external protective measure is required.
* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.
* Isolate affected products from the corporate network.
* If remote access is required, use secure methods such as virtual private networks (VPNs).
Exploits
Credits
Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated.