Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.
References
| Link | Resource |
|---|---|
| https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-01 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
| AND |
|
History
07 Feb 2024, 14:09
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:gesslergmbh:web-master_firmware:7.9:*:*:*:*:*:*:* cpe:2.3:h:gesslergmbh:web-master:-:*:*:*:*:*:*:* |
|
| CWE | CWE-287 | |
| Summary |
|
|
| References | () https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-01 - Third Party Advisory, US Government Resource | |
| First Time |
Gesslergmbh
Gesslergmbh web-master Gesslergmbh web-master Firmware |
01 Feb 2024, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-02-01 22:15
Updated : 2024-02-07 14:09
NVD link : CVE-2024-1039
Mitre link : CVE-2024-1039
CVE.ORG link : CVE-2024-1039
JSON object : View
Products Affected
gesslergmbh
- web-master
- web-master_firmware
