CVE-2026-3323
Unauthenticated Access to Sensitive Data via Unsecured Interface
Publication date: 2026-04-28
Last updated on: 2026-04-28
Assigner: CERT VDE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| vega | vegapuls6x_pn_firmware | 1.0.0 |
| vega | vegapuls6x_pn_firmware | 1.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-3323 is a vulnerability in VEGA Grieshaber KG's VEGAPULS 6X devices running firmware versions 1.0.0 and 1.1.0. It involves an unsecured configuration interface that lacks authentication controls, allowing unauthenticated remote attackers to access sensitive information.
This interface exposes sensitive data such as hashed credentials and access codes to unauthorized users, including those with no or low privileges. This can enable attackers to impersonate authorized users and potentially modify device configurations without authentication.
The vulnerability is categorized under CWE-306 (Missing Authentication for Critical Function) and has a high severity rating with a CVSS v3.1 base score of 7.5.
How can this vulnerability impact me? :
This vulnerability can have a significant impact by allowing unauthenticated remote attackers to access sensitive information such as hashed credentials and access codes.
Attackers can use this information to impersonate authorized users and potentially perform authenticated modifications to the device configurations without permission.
Although the vulnerability does not affect integrity or availability, the high confidentiality impact means sensitive data exposure could lead to further security breaches.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
The vulnerability involves an unsecured configuration interface on VEGAPULS 6X devices running firmware versions 1.0.0 and 1.1.0 that allows unauthenticated remote access to sensitive information.
Detection can focus on identifying devices running the vulnerable firmware versions and checking for the presence of the exposed configuration interface, particularly the network service "FDI over PROFINET".
While specific commands are not provided in the resources, network scanning tools can be used to detect devices exposing the "FDI over PROFINET" service on the network.
- Use network scanning tools (e.g., nmap) to scan for open PROFINET-related ports or services on devices.
- Identify devices running firmware versions 1.0.0 or 1.1.0 by querying device information if accessible.
- Check for unauthorized access to the configuration interface by attempting to access it without authentication in a controlled environment.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include disabling the network service "FDI over PROFINET" if it is not required, to reduce exposure of the unsecured configuration interface.
Implement strict access controls on physical interfaces to prevent unauthorized physical access to the devices.
Update the affected devices to the fixed firmware version 1.1.1, which addresses the vulnerability.
After applying the firmware update, restart the vulnerable component to ensure the fix is active.
Rotate any credentials used on the affected devices, as they may have been compromised.
For emergency credential rotation or further assistance, contact VEGA Support.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes, which can lead to unauthorized access and impersonation of authorized users.
Such unauthorized access to sensitive data can result in non-compliance with common standards and regulations like GDPR and HIPAA, which require protection of sensitive information and proper access controls.
Failure to secure configuration interfaces and protect credentials may lead to breaches of confidentiality obligations mandated by these regulations.