Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
                
            Metrics
Affected Vendors & Products
References
        | Link | Providers | 
|---|---|
| https://cert.vde.com/en/advisories/VDE-2022-057/ | 
                     | 
            
History
                    Mon, 14 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Status: PUBLISHED
Assigner: CERTVDE
Published: 2022-12-13T07:26:17.752Z
Updated: 2025-04-14T18:12:33.668Z
Reserved: 2022-11-21T11:21:00.430Z
Link: CVE-2022-4098
Updated: 2024-08-03T01:27:54.380Z
Status : Modified
Published: 2022-12-13T08:15:10.283
Modified: 2024-11-21T07:34:34.737
Link: CVE-2022-4098
No data.