Multiple Wiesemann&Theis products of the ComServer Series...
High severity
Unreviewed
Published
Dec 13, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
Dec 13, 2022
Published to the GitHub Advisory Database
Dec 13, 2022
Last updated
Jan 28, 2023
Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. During an authenticated session to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
References