Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A495C583-8184-45A5-81E9-E621A58B7E51", "versionEndIncluding": "26", "versionStartIncluding": "19", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "532907AF-7E4A-4065-A799-753FC3313D6C", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85625EA0-E44C-4A48-BA05-5D506CFDB678", "versionEndIncluding": "26", "versionStartIncluding": "18", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E5D5929-675F-493C-B3AF-70C7C79D3CEB", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F73AE30-E917-433E-BB67-CA383FCDDAFC", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA3F602-1720-4B4B-A834-BD620D9B1F54", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1FED163-F917-4CBC-83DA-D4D751C9121B", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F0C3C2-DE57-4134-AC3C-3D000A33528A", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."}, {"lang": "es", "value": "En los productos Wago afectados, un atacante remoto con privilegios administrativos puede acceder a archivos a los que ya tiene acceso a trav\u00e9s de una inclusi\u00f3n de archivo local no documentada. Este acceso se registra en un archivo de registro diferente al esperado."}], "id": "CVE-2023-4089", "lastModified": "2024-11-21T08:34:22.010", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1"}, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "info@cert.vde.com", "type": "Secondary"}]}, "published": "2023-10-17T07:15:10.090", "references": [{"source": "info@cert.vde.com", "tags": ["Third Party Advisory"], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"}], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-610"}], "source": "info@cert.vde.com", "type": "Secondary"}]}