Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Wut
Subscribe
|
At-modem-emulator
Subscribe
At-modem-emulator Firmware
Subscribe
Com-server 20ma
Subscribe
Com-server 20ma Firmware
Subscribe
Com-server \+\+
Subscribe
Com-server \+\+ Firmware
Subscribe
Com-server Highspeed 100basefx
Subscribe
Com-server Highspeed 100basefx Firmware
Subscribe
Com-server Highspeed 100baselx
Subscribe
Com-server Highspeed 100baselx Firmware
Subscribe
Com-server Highspeed 19\" 1port
Subscribe
Com-server Highspeed 19\" 1port Firmware
Subscribe
Com-server Highspeed 19\" 4port
Subscribe
Com-server Highspeed 19\" 4port Firmware
Subscribe
Com-server Highspeed Compact
Subscribe
Com-server Highspeed Compact Firmware
Subscribe
Com-server Highspeed Industry
Subscribe
Com-server Highspeed Industry Firmware
Subscribe
Com-server Highspeed Isolated
Subscribe
Com-server Highspeed Isolated Firmware
Subscribe
Com-server Highspeed Lc
Subscribe
Com-server Highspeed Lc Firmware
Subscribe
Com-server Highspeed Oem
Subscribe
Com-server Highspeed Oem Firmware
Subscribe
Com-server Highspeed Office 1port
Subscribe
Com-server Highspeed Office 1port Firmware
Subscribe
Com-server Highspeed Office 4port
Subscribe
Com-server Highspeed Office 4port Firmware
Subscribe
Com-server Highspeed Poe
Subscribe
Com-server Highspeed Poe 3x Isolated
Subscribe
Com-server Highspeed Poe 3x Isolated Firmware
Subscribe
Com-server Highspeed Poe Firmware
Subscribe
Com-server Highspeed Ul
Subscribe
Com-server Highspeed Ul Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-45850 | Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/de/advisories/VDE-2022-043 |
|
History
Thu, 01 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-05-01T19:01:20.740Z
Reserved: 2022-10-11T13:32:19.672Z
Link: CVE-2022-42787
Updated: 2024-08-03T13:19:04.509Z
Status : Modified
Published: 2022-11-10T12:15:10.927
Modified: 2024-11-21T07:25:20.673
Link: CVE-2022-42787
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD