Show plain JSON{"containers": {"cna": {"affected": [{"product": "WHA-GW-F2D2-0-AS- Z2-ETH", "vendor": "Phoenix Contact", "versions": [{"lessThanOrEqual": "3.0.9", "status": "affected", "version": "3.0.9", "versionType": "custom"}]}, {"product": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP", "vendor": "Phoenix Contact", "versions": [{"lessThanOrEqual": "3.0.9", "status": "affected", "version": "3.0.9", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."}], "datePublic": "2021-08-16T00:00:00", "descriptions": [{"lang": "en", "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-522", "description": "CWE-522 Insufficiently Protected Credentials", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2021-08-31T10:32:55", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://cert.vde.com/en-us/advisories/vde-2021-027"}], "solutions": [{"lang": "en", "value": "No update available."}], "source": {"advisory": "VDE-2021-027", "discovery": "INTERNAL"}, "title": "A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information", "workarounds": [{"lang": "en", "value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."}], "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-08-16T07:07:00.000Z", "ID": "CVE-2021-34560", "STATE": "PUBLIC", "TITLE": "A vulnerability in WirelessHART-Gateway <= 3.0.9 could lead to information exposure of sensitive information"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH", "version": {"version_data": [{"version_affected": "<=", "version_name": "3.0.9", "version_value": "3.0.9"}]}}, {"product_name": "WHA-GW-F2D2-0-AS- Z2-ETH.EIP", "version": {"version_data": [{"version_affected": "<=", "version_name": "3.0.9", "version_value": "3.0.9"}]}}]}, "vendor_name": "Phoenix Contact"}]}}, "credit": [{"lang": "eng", "value": "Pepperl+Fuchs reported this vulnerability. CERT@VDE coordinated."}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-522 Insufficiently Protected Credentials"}]}]}, "references": {"reference_data": [{"name": "https://cert.vde.com/en-us/advisories/vde-2021-027", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-027"}]}, "solution": [{"lang": "en", "value": "No update available."}], "source": {"advisory": "VDE-2021-027", "discovery": "INTERNAL"}, "work_around": [{"lang": "en", "value": "An external protective measure is required.\n\n* Minimize network exposure for affected products and ensure that they are not accessible via the Internet.\n* Isolate affected products from the corporate network.\n* If remote access is required, use secure methods such as virtual private networks (VPNs)."}]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T00:12:50.418Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://cert.vde.com/en-us/advisories/vde-2021-027"}]}]}, "cveMetadata": {"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-34560", "datePublished": "2021-08-31T10:32:55.386572Z", "dateReserved": "2021-06-10T00:00:00", "dateUpdated": "2024-09-16T23:00:54.389Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}