CVE-2026-3323
Received Received - Intake
Unauthenticated Access to Sensitive Data via Unsecured Interface

Publication date: 2026-04-28

Last updated on: 2026-04-28

Assigner: CERT VDE

Description
An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
vega vegapuls6x_pn_firmware 1.0.0
vega vegapuls6x_pn_firmware 1.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-3323 is a vulnerability in VEGA Grieshaber KG's VEGAPULS 6X devices running firmware versions 1.0.0 and 1.1.0. It involves an unsecured configuration interface that lacks authentication controls, allowing unauthenticated remote attackers to access sensitive information.

This interface exposes sensitive data such as hashed credentials and access codes to unauthorized users, including those with no or low privileges. This can enable attackers to impersonate authorized users and potentially modify device configurations without authentication.

The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function) and has a high severity rating with a CVSS v3.1 base score of 7.5.


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing unauthenticated remote attackers to access sensitive information such as hashed credentials and access codes.

Attackers can use this information to impersonate authorized users and potentially perform authenticated modifications to the device configurations without permission.

Although the vulnerability does not affect integrity or availability, the high confidentiality impact means sensitive data exposure could lead to further security breaches.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability involves an unsecured configuration interface on VEGAPULS 6X devices running firmware versions 1.0.0 and 1.1.0 that allows unauthenticated remote access to sensitive information.

Detection can focus on identifying devices running the vulnerable firmware versions and checking for the presence of the exposed configuration interface, particularly the network service "FDI over PROFINET".

While specific commands are not provided in the resources, network scanning tools can be used to detect devices exposing the "FDI over PROFINET" service on the network.

  • Use network scanning tools (e.g., nmap) to scan for open PROFINET-related ports or services on devices.
  • Identify devices running firmware versions 1.0.0 or 1.1.0 by querying device information if accessible.
  • Check for unauthorized access to the configuration interface by attempting to access it without authentication in a controlled environment.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling the network service "FDI over PROFINET" if it is not required, to reduce exposure of the unsecured configuration interface.

Implement strict access controls on physical interfaces to prevent unauthorized physical access to the devices.

Update the affected devices to the fixed firmware version 1.1.1, which addresses the vulnerability.

After applying the firmware update, restart the vulnerable component to ensure the fix is active.

Rotate any credentials used on the affected devices, as they may have been compromised.

For emergency credential rotation or further assistance, contact VEGA Support.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes, which can lead to unauthorized access and impersonation of authorized users.

Such unauthorized access to sensitive data can result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive information and proper access controls.

Failure to secure configuration interfaces and protect credentials may lead to breaches of confidentiality obligations mandated by these regulations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart