The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-054/ | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2022-054/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 07:20
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-19 12:15
Updated : 2024-11-21 07:20
NVD link : CVE-2022-3738
Mitre link : CVE-2022-3738
CVE.ORG link : CVE-2022-3738
JSON object : View
Products Affected
wago
- touch_panel_600_standard_firmware
- touch_panel_600_advanced
- touch_panel_600_standard
- touch_panel_600_marine_firmware
- edge_controller_firmware
- pfc200_firmware
- pfc200
- pfc100_firmware
- edge_controller
- cc100
- pfc100
- touch_panel_600_advanced_firmware
- touch_panel_600_marine
- cc100_firmware
CWE
CWE-306
Missing Authentication for Critical Function