Files
CVEs-PoC/2021/CVE-2021-34560.md
2025-09-29 21:09:30 +02:00

19 lines
910 B
Markdown

### [CVE-2021-34560](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34560)
![](https://img.shields.io/static/v1?label=Product&message=WHA-GW-F2D2-0-AS-%20Z2-ETH&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=WHA-GW-F2D2-0-AS-%20Z2-ETH.EIP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=3.0.9%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-522%20Insufficiently%20Protected%20Credentials&color=brightgreen)
### Description
In PEPPERL+FUCHS WirelessHART-Gateway <= 3.0.9 a form contains a password field with autocomplete enabled. The stored credentials can be captured by an attacker who gains control over the user's computer. Therefore the user must have logged in at least once.
### POC
#### Reference
- https://cert.vde.com/en-us/advisories/vde-2021-027
#### Github
No PoCs found on GitHub currently.