Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-42787— Wiesemann & Theis: Small number space for allocating session id in Com-Server family

CVSS 8.8 · High EPSS 0.91% · P76
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-42787

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Wiesemann & Theis: Small number space for allocating session id in Com-Server family
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple W&T products of the Comserver Series use a small number space for allocating sessions ids. After login of an user an unathenticated remote attacker can brute force the users session id and get access to his account on the the device. As the user needs to log in for the attack to be successful a user interaction is required.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用不充分的随机数
Source: NVD (National Vulnerability Database)
Vulnerability Title
Wiesemann & Theis Com-Server Family 安全特征问题特征问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Wiesemann & Theis Com-Server Family是德国Wiesemann & Theis公司的一系列串行设备服务器。 Wiesemann & Theis Com-Server Family 存在安全特征问题漏洞。攻击者利用该漏洞强行使用会话id并访问设备上的帐户。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

II. Public POCs for CVE-2022-42787

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-42787

登录查看更多情报信息。

Same Patch Batch · Wiesemann & Theis · 2022-11-10 · 3 CVEs total

CVE-2022-427859.8 CRITICALWiesemann & Theis: Authentication bypass in Com-Server family
CVE-2022-427865.4 MEDIUMWiesemann & Theis: XSS vulnerability in web interface of the Com-Server family

IV. Related Vulnerabilities

V. Comments for CVE-2022-42787

No comments yet


Leave a comment