Search criteria

14 vulnerabilities found for 750-8202\/040-000_firmware by wago

CVE-2023-1620 (GCVE-0-2023-1620)

Vulnerability from nvd – Published: 2023-06-26 06:19 – Updated: 2024-11-12 14:11
VLAI?
Title
WAGO: DoS in multiple products in multiple versions using Codesys
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.833Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1620",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:30:42.286955Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T14:11:36.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:51.078Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple products in multiple versions using Codesys",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1620",
    "datePublished": "2023-06-26T06:19:30.928Z",
    "dateReserved": "2023-03-24T10:12:26.426Z",
    "dateUpdated": "2024-11-12T14:11:36.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1619 (GCVE-0-2023-1619)

Vulnerability from nvd – Published: 2023-06-26 06:18 – Updated: 2024-10-02 05:28
VLAI?
Title
WAGO: DoS in multiple versions of multiple products
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:23.250Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple versions of multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1619",
    "datePublished": "2023-06-26T06:18:33.981Z",
    "dateReserved": "2023-03-24T10:12:25.218Z",
    "dateUpdated": "2024-10-02T05:28:23.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34569 (GCVE-0-2021-34569)

Vulnerability from nvd – Published: 2022-11-09 15:17 – Updated: 2025-05-01 19:17
VLAI?
Title
WAGO I/O-Check Service prone to Out-of-bounds Write
Summary
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.524Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34569",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T19:17:25.396965Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T19:17:39.712Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-123",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-123 Buffer Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:36.366Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34569",
    "datePublished": "2022-11-09T15:17:36.366Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T19:17:39.712Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34568 (GCVE-0-2021-34568)

Vulnerability from nvd – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:20
VLAI?
Title
WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.423Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34568",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:20:11.257503Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:20:17.218Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:29.795Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34568",
    "datePublished": "2022-11-09T15:17:29.795Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:20:17.218Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34567 (GCVE-0-2021-34567)

Vulnerability from nvd – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:20
VLAI?
Title
WAGO I/O-Check Service prone to Out-of-bounds Read
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.416Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34567",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:20:33.137134Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:20:39.270Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-540",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-540 Overread Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:23.429Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Out-of-bounds Read",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34567",
    "datePublished": "2022-11-09T15:17:23.429Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:20:39.270Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34566 (GCVE-0-2021-34566)

Vulnerability from nvd – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:21
VLAI?
Title
WAGO I/O-Check Service prone to Memory Overflow
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
CWE
  • CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34566",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:21:03.913921Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:21:10.643Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:14.172Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Memory Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34566",
    "datePublished": "2022-11-09T15:17:14.172Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:21:10.643Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3281 (GCVE-0-2022-3281)

Vulnerability from nvd – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Title
WAGO: multiple products - Loss of MAC-Address-Filtering after reboot
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
CWE
  • CWE-440 - Expected Behavior Violation
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-8217/xxx-xxx Series PFC100/PFC200 Affected: 03.04.10(16) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO Compact Controller CC100 Affected: 03.07.17(19) , ≤ 03.09.08(21) (custom)
Create a notification for this product.
    WAGO 762-4xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-5xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-6xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 752-8303/8000-002 Edge Controller Affected: 03.06.09(18) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3281",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:56:08.488527Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:56:32.932Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-81xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-8217/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.04.10(16)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-82xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.09.08(21)",
              "status": "affected",
              "version": "03.07.17(19)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-4xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-5xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-6xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "752-8303/8000-002 Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.06.09(18)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-440",
              "description": "CWE-440 Expected Behavior Violation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
        }
      ],
      "source": {
        "advisory": "VDE-2022-042",
        "defect": [
          "CERT@VDE#64236"
        ],
        "discovery": "INTERNAL"
      },
      "title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-3281",
    "datePublished": "2022-10-17T08:20:12.389Z",
    "dateReserved": "2022-09-23T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:56:32.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1620 (GCVE-0-2023-1620)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:19 – Updated: 2024-11-12 14:11
VLAI?
Title
WAGO: DoS in multiple products in multiple versions using Codesys
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.833Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1620",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:30:42.286955Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T14:11:36.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:51.078Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple products in multiple versions using Codesys",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1620",
    "datePublished": "2023-06-26T06:19:30.928Z",
    "dateReserved": "2023-03-24T10:12:26.426Z",
    "dateUpdated": "2024-11-12T14:11:36.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1619 (GCVE-0-2023-1619)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:18 – Updated: 2024-10-02 05:28
VLAI?
Title
WAGO: DoS in multiple versions of multiple products
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:23.250Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple versions of multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1619",
    "datePublished": "2023-06-26T06:18:33.981Z",
    "dateReserved": "2023-03-24T10:12:25.218Z",
    "dateUpdated": "2024-10-02T05:28:23.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34569 (GCVE-0-2021-34569)

Vulnerability from cvelistv5 – Published: 2022-11-09 15:17 – Updated: 2025-05-01 19:17
VLAI?
Title
WAGO I/O-Check Service prone to Out-of-bounds Write
Summary
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.524Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34569",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T19:17:25.396965Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T19:17:39.712Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-123",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-123 Buffer Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-787",
              "description": "CWE-787 Out-of-bounds Write",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:36.366Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Out-of-bounds Write",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34569",
    "datePublished": "2022-11-09T15:17:36.366Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T19:17:39.712Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34568 (GCVE-0-2021-34568)

Vulnerability from cvelistv5 – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:20
VLAI?
Title
WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.423Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34568",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:20:11.257503Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:20:17.218Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:29.795Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Allocation of Resources Without Limits or Throttling",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34568",
    "datePublished": "2022-11-09T15:17:29.795Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:20:17.218Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34567 (GCVE-0-2021-34567)

Vulnerability from cvelistv5 – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:20
VLAI?
Title
WAGO I/O-Check Service prone to Out-of-bounds Read
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.416Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34567",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:20:33.137134Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:20:39.270Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-540",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-540 Overread Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-125",
              "description": "CWE-125 Out-of-bounds Read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:23.429Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Out-of-bounds Read",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34567",
    "datePublished": "2022-11-09T15:17:23.429Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:20:39.270Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-34566 (GCVE-0-2021-34566)

Vulnerability from cvelistv5 – Published: 2022-11-09 15:17 – Updated: 2025-05-01 14:21
VLAI?
Title
WAGO I/O-Check Service prone to Memory Overflow
Summary
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
CWE
  • CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxxFW Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 752-8303/8000-0002 Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-4xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-5xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
    WAGO 762-6xxx Affected: FW1 , ≤ FW18 Patch 2 (custom)
Create a notification for this product.
Credits
These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T00:12:50.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-34566",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-01T14:21:03.913921Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-01T14:21:10.643Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-81xx/xxx-xxxFW",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-82xx/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-4xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-5xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "762-6xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW18 Patch 2",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "These vulnerabilities were reported to WAGO by Uri Katz of Claroty."
        }
      ],
      "datePublic": "2021-06-29T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In WAGO\u0026nbsp;I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS."
            }
          ],
          "value": "In WAGO\u00a0I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-09T15:17:14.172Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2020-036/"
        }
      ],
      "source": {
        "advisory": "VDE-2020-036",
        "discovery": "EXTERNAL"
      },
      "title": "WAGO I/O-Check Service prone to Memory Overflow",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-34566",
    "datePublished": "2022-11-09T15:17:14.172Z",
    "dateReserved": "2021-06-10T19:19:08.023Z",
    "dateUpdated": "2025-05-01T14:21:10.643Z",
    "requesterUserId": "520cc88b-a1c8-44f6-9154-21a4d74c769f",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3281 (GCVE-0-2022-3281)

Vulnerability from cvelistv5 – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Title
WAGO: multiple products - Loss of MAC-Address-Filtering after reboot
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
CWE
  • CWE-440 - Expected Behavior Violation
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-8217/xxx-xxx Series PFC100/PFC200 Affected: 03.04.10(16) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO Compact Controller CC100 Affected: 03.07.17(19) , ≤ 03.09.08(21) (custom)
Create a notification for this product.
    WAGO 762-4xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-5xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-6xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 752-8303/8000-002 Edge Controller Affected: 03.06.09(18) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3281",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:56:08.488527Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:56:32.932Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-81xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-8217/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.04.10(16)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-82xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.09.08(21)",
              "status": "affected",
              "version": "03.07.17(19)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-4xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-5xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-6xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "752-8303/8000-002 Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.06.09(18)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-440",
              "description": "CWE-440 Expected Behavior Violation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
        }
      ],
      "source": {
        "advisory": "VDE-2022-042",
        "defect": [
          "CERT@VDE#64236"
        ],
        "discovery": "INTERNAL"
      },
      "title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-3281",
    "datePublished": "2022-10-17T08:20:12.389Z",
    "dateReserved": "2022-09-23T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:56:32.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}