CVE-2021-20999

In Weidmüller u-controls and IoT-Gateways in versions up to 1.12.1 a network port intended only for device-internal usage is accidentally accessible via external network interfaces. By exploiting this vulnerability the device may be manipulated or the operation may be stopped.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.4 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
weidmuelleruc20-wl2000-ac_firmware
1.3.0 ≤
𝑥
< 1.9.1
weidmuelleruc20-wl2000-ac_firmware
1.10.0 ≤
𝑥
< 1.10.3
weidmuelleruc20-wl2000-ac_firmware
1.11.0
weidmuelleruc20-wl2000-ac_firmware
1.12.1
weidmuelleruc20-wl2000-iot_firmware
1.3.0 ≤
𝑥
< 1.9.1
weidmuelleruc20-wl2000-iot_firmware
1.10.0 ≤
𝑥
< 1.10.3
weidmuelleruc20-wl2000-iot_firmware
1.11.0
weidmuelleruc20-wl2000-iot_firmware
1.12.1
weidmuelleriot-gw30_firmware
1.3.0 ≤
𝑥
< 1.9.1
weidmuelleriot-gw30_firmware
1.10.0 ≤
𝑥
< 1.10.3
weidmuelleriot-gw30_firmware
1.11.0
weidmuelleriot-gw30_firmware
1.12.1
weidmuelleriot-gw30-4g-eu_firmware
1.3.0 ≤
𝑥
< 1.9.1
weidmuelleriot-gw30-4g-eu_firmware
1.10.0 ≤
𝑥
< 1.10.3
weidmuelleriot-gw30-4g-eu_firmware
1.11.0
weidmuelleriot-gw30-4g-eu_firmware
1.12.1
𝑥
= Vulnerable software versions