Multiple Wiesemann&Theis products of the ComServer Series are prone to an authentication bypass through IP spoofing. After a user logged in to the WBM of the Com-Server an unauthenticated attacker in the same subnet can obtain the session ID and through IP spoofing change arbitrary settings by crafting modified HTTP Get requests. This may result in a complete takeover of the device.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://cert.vde.com/en/advisories/VDE-2022-057/ |
![]() ![]() |
History
Mon, 14 Apr 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-04-14T18:12:33.668Z
Reserved: 2022-11-21T11:21:00.430Z
Link: CVE-2022-4098

Updated: 2024-08-03T01:27:54.380Z

Status : Modified
Published: 2022-12-13T08:15:10.283
Modified: 2024-11-21T07:34:34.737
Link: CVE-2022-4098

No data.