Vulnerability Details CVE-2023-3572
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to gain full access to the device.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.5%
CVSS Severity
CVSS v3 Score 10.0
Products affected by CVE-2023-3572
-
cpe:2.3:h:phoenixcontact:wp_6070-wvps:-
-
cpe:2.3:h:phoenixcontact:wp_6101-wxps:-
-
cpe:2.3:h:phoenixcontact:wp_6121-wxps:-
-
cpe:2.3:h:phoenixcontact:wp_6156-whps:-
-
cpe:2.3:h:phoenixcontact:wp_6185-whps:-
-
cpe:2.3:h:phoenixcontact:wp_6215-whps:-
-
cpe:2.3:o:phoenixcontact:wp_6070-wvps_firmware:*
-
cpe:2.3:o:phoenixcontact:wp_6101-wxps_firmware:*
-
cpe:2.3:o:phoenixcontact:wp_6121-wxps_firmware:*
-
cpe:2.3:o:phoenixcontact:wp_6156-whps_firmware:*
-
cpe:2.3:o:phoenixcontact:wp_6185-whps_firmware:*
-
cpe:2.3:o:phoenixcontact:wp_6215-whps_firmware:*