Search criteria

35 vulnerabilities by Wago

CVE-2025-41716 (GCVE-0-2025-41716)

Vulnerability from cvelistv5 – Published: 2025-09-24 09:04 – Updated: 2025-09-24 13:03
VLAI?
Title
Unauthenticated User Enumeration via Missing Authentication
Summary
The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO Solution Builder Affected: 0.0.0 , < 2.3.3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41716",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-24T13:03:29.670633Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-24T13:03:53.265Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Solution Builder",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "2.3.3",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function.\u003cbr\u003e"
            }
          ],
          "value": "The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-24T09:04:33.971Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-087"
        }
      ],
      "source": {
        "advisory": "VDE-2025-087",
        "defect": [
          "CERT@VDE#641858"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unauthenticated User Enumeration via Missing Authentication",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41716",
    "datePublished": "2025-09-24T09:04:33.971Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-09-24T13:03:53.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41715 (GCVE-0-2025-41715)

Vulnerability from cvelistv5 – Published: 2025-09-24 09:04 – Updated: 2025-09-24 13:07
VLAI?
Title
Missing Authentication for Database Access in Web Application
Summary
The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO Device Sphere Affected: 0.0.0 , < 1.1.0 (semver)
Create a notification for this product.
    WAGO Solution Builder Affected: 0.0.0 , < 2.3.3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41715",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-24T13:07:23.769369Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-24T13:07:30.391Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Device Sphere",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Solution Builder",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "2.3.3",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it.\u003c/p\u003e"
            }
          ],
          "value": "The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-24T09:04:22.835Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-087"
        }
      ],
      "source": {
        "advisory": "VDE-2025-087",
        "defect": [
          "CERT@VDE#641858"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Missing Authentication for Database Access in Web Application",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41715",
    "datePublished": "2025-09-24T09:04:22.835Z",
    "dateReserved": "2025-04-16T11:17:48.312Z",
    "dateUpdated": "2025-09-24T13:07:30.391Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41713 (GCVE-0-2025-41713)

Vulnerability from cvelistv5 – Published: 2025-09-15 08:00 – Updated: 2025-09-15 15:23
VLAI?
Title
WAGO: Vulnerability in hardware switch circuit
Summary
During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration.
CWE
  • CWE-1188 - Insecure Default Initialization of Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9301 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9301 HW rev. &lt;082100 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9301/K000-0005 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9301/K000-0005 HW rev. &lt;082100 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9401 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9401 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9402 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9402/0000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9402/0000-0001 HW rev. &lt;052800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9402 HW rev. &lt;032800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9403 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9403 HW rev. &lt;022800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 HW rev. 32500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4101 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4101 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4102 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4102 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4104 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4104 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0001 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4301/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4301/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4302/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4302/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4303/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4303/8000-0002 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4304/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4304/8000-0002 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4305/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4305/8000-0002 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0001 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0002 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5201/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5201/8000-0001 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5203/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5203/8000-0001 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5205/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5205/8000-0001 HW rev. &lt;032500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5206/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5206/8000-0001 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41713",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-15T15:23:05.302247Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-15T15:23:17.088Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301 HW rev. \u0026lt;082100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301/K000-0005",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301/K000-0005 HW rev. \u0026lt;082100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9401",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9401 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402/0000-0001 HW rev. \u0026lt;052800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402 HW rev. \u0026lt;032800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9403",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9403 HW rev. \u0026lt;022800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002 HW rev. 32500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4101",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4101 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4102",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4102 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4104",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4104 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0001 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4301/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4301/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4302/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4302/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4303/8000-0002 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4304/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4304/8000-0002 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4305/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4305/8000-0002 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0001 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0002 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5201/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5201/8000-0001 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5203/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5203/8000-0001 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5205/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5205/8000-0001 HW rev. \u0026lt;032500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5206/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5206/8000-0001 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration."
            }
          ],
          "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-15T08:00:50.241Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-083"
        },
        {
          "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-083.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-083",
        "defect": [
          "CERT@VDE#641852"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Vulnerability in hardware switch circuit",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41713",
    "datePublished": "2025-09-15T08:00:50.241Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2025-09-15T15:23:17.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41664 (GCVE-0-2025-41664)

Vulnerability from cvelistv5 – Published: 2025-09-08 06:39 – Updated: 2025-09-08 16:03
VLAI?
Title
Improper Permission Handling Enables Unauthorized Access to Firmware and Certificates
Summary
A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41664",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T16:02:34.291705Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T16:03:08.365Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/0040-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/K013-1080",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/K019-7576",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0363",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0363/0040-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0364/0040-0010",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0365/0040-0010",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0366",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T06:39:19.566Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-048"
        }
      ],
      "source": {
        "advisory": "VDE-2025-048",
        "defect": [
          "CERT@VDE#641798"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Improper Permission Handling Enables Unauthorized Access to Firmware and Certificates",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41664",
    "datePublished": "2025-09-08T06:39:19.566Z",
    "dateReserved": "2025-04-16T11:17:48.307Z",
    "dateUpdated": "2025-09-08T16:03:08.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41672 (GCVE-0-2025-41672)

Vulnerability from cvelistv5 – Published: 2025-07-07 06:17 – Updated: 2025-07-07 16:34
VLAI?
Title
WAGO: Vulnerability in WAGO Device Sphere
Summary
A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41672",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-07T16:27:29.386240Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-07T16:34:52.794Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Wago Device Sphere",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "1.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices."
            }
          ],
          "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-07T06:17:18.988Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-057"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-057.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Vulnerability in WAGO Device Sphere",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41672",
    "datePublished": "2025-07-07T06:17:18.988Z",
    "dateReserved": "2025-04-16T11:17:48.308Z",
    "dateUpdated": "2025-07-07T16:34:52.794Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25265 (GCVE-0-2025-25265)

Vulnerability from cvelistv5 – Published: 2025-06-16 09:46 – Updated: 2025-11-21 11:38
VLAI?
Title
Unauthenticated File Read via Web Interface
Summary
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system’s file structure.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25265",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T18:12:43.011626Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T18:13:49.552Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WAGO CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system\u2019s file structure.\u003cbr\u003e"
            }
          ],
          "value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system\u2019s file structure."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-21T11:38:18.852Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-018/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-018",
        "defect": [
          "CERT@VDE#641748"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unauthenticated File Read via Web Interface",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-25265",
    "datePublished": "2025-06-16T09:46:13.998Z",
    "dateReserved": "2025-02-06T12:30:08.318Z",
    "dateUpdated": "2025-11-21T11:38:18.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-25264 (GCVE-0-2025-25264)

Vulnerability from cvelistv5 – Published: 2025-06-16 09:45 – Updated: 2025-11-21 11:36
VLAI?
Title
Overly Permissive CORS Policy in WAGO Device Manager
Summary
An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system.
CWE
  • CWE-942 - Permissive Cross-domain Policy with Untrusted Domains
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (70 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25264",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T18:15:48.127204Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T18:15:58.245Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-942",
              "description": "CWE-942 Permissive Cross-domain Policy with Untrusted Domains",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-21T11:36:54.281Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-018/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-018",
        "defect": [
          "CERT@VDE#641748"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Overly Permissive CORS Policy in WAGO Device Manager",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-25264",
    "datePublished": "2025-06-16T09:45:31.613Z",
    "dateReserved": "2025-02-06T12:30:08.317Z",
    "dateUpdated": "2025-11-21T11:36:54.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-1235 (GCVE-0-2025-1235)

Vulnerability from cvelistv5 – Published: 2025-06-02 06:23 – Updated: 2025-06-02 17:03
VLAI?
Title
WAGO: Switches affected by year 2k38 problem
Summary
A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.
CWE
  • CWE-190 - Integer Overflow or Wraparound
Assigner
Credits
Marcus Kramhöller from Noris Automatio GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1235",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T17:02:26.990253Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T17:03:08.740Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-0303",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1305",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1305/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1505",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1505/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1812",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1812/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0010-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1816",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1816/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Marcus Kramh\u00f6ller from Noris Automatio GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970."
            }
          ],
          "value": "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T06:23:19.261Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-020"
        }
      ],
      "source": {
        "advisory": "VDE-2025-020",
        "defect": [
          "CERT@VDE#641749"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Switches affected by year 2k38 problem",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-1235",
    "datePublished": "2025-06-02T06:23:19.261Z",
    "dateReserved": "2025-02-11T15:46:42.856Z",
    "dateUpdated": "2025-06-02T17:03:08.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0101 (GCVE-0-2025-0101)

Vulnerability from cvelistv5 – Published: 2025-04-16 07:29 – Updated: 2025-04-16 14:40
VLAI?
Title
WAGO: Year 2038 problem
Summary
A low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart.
CWE
  • CWE-190 - Integer Overflow or Wraparound
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 03.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 03.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
Credits
Marcus Kramhöller from Noris Automatio GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0101",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T14:40:07.343717Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T14:40:37.827Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "03.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "03.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Marcus Kramh\u00f6ller from Noris Automatio GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart.\u003c/p\u003e"
            }
          ],
          "value": "A low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-16T07:29:06.441Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-007"
        }
      ],
      "source": {
        "advisory": "VDE-2025-007",
        "defect": [
          "CERT@VDE#641734"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Year 2038 problem",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-0101",
    "datePublished": "2025-04-16T07:29:06.441Z",
    "dateReserved": "2024-12-19T10:35:03.865Z",
    "dateUpdated": "2025-04-16T14:40:37.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12650 (GCVE-0-2024-12650)

Vulnerability from cvelistv5 – Published: 2025-03-05 11:46 – Updated: 2025-03-05 14:12
VLAI?
Title
Wago: Vulnerability in libwagosnmp
Summary
An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
Credits
Gabriele Quagliarella from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-05T14:11:34.419639Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-05T14:12:02.004Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Gabriele Quagliarella from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.\u003c/p\u003e"
            }
          ],
          "value": "An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-252",
              "description": "CWE-252 Unchecked Return Value",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-05T11:46:15.486Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-004"
        }
      ],
      "source": {
        "advisory": "VDE-2025-004",
        "defect": [
          "CERT@VDE#641731"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Wago: Vulnerability in libwagosnmp",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-12650",
    "datePublished": "2025-03-05T11:46:15.486Z",
    "dateReserved": "2024-12-16T07:37:06.620Z",
    "dateUpdated": "2025-03-05T14:12:02.004Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-25108 (GCVE-0-2018-25108)

Vulnerability from cvelistv5 – Published: 2025-01-16 10:17 – Updated: 2025-01-16 14:13
VLAI?
Title
WAGO: Denial of service in 750-8xx controller due to uncontrolled resource consumption
Summary
An unauthenticated remote attacker can cause a DoS in the controller due to uncontrolled resource consumption.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
WAGO 750-8100 (Controller PFC100) Affected: 0 , ≤ 02.05.23(08) (semver)
Create a notification for this product.
    WAGO 750-831 (Controller BACnet/IP) Affected: 0 , ≤ 01.02.29(09) (semver)
Create a notification for this product.
    WAGO 750-880 (Controller ETH) Affected: 0 , ≤ 01.07.03(10) (semver)
Create a notification for this product.
    WAGO 750-889 (Controller KNX IP) Affected: 0 , ≤ 01.07.13(10) (semver)
Create a notification for this product.
Credits
Matthias Niedermaier (Hochschule Augsburg) Jan-Ole Malchow (Freie Universität Berlin) Florian Fischer (Hochschule Augsburg)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-25108",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-16T14:12:32.309251Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-16T14:13:05.340Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8100 (Controller PFC100)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "02.05.23(08)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831 (Controller BACnet/IP)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.02.29(09)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880 (Controller ETH)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.07.03(10)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889 (Controller KNX IP)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.07.13(10)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Matthias Niedermaier (Hochschule Augsburg)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jan-Ole Malchow (Freie Universita\u0308t Berlin)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Florian Fischer (Hochschule Augsburg)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can cause a DoS in the controller due to\u0026nbsp;uncontrolled resource consumption.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can cause a DoS in the controller due to\u00a0uncontrolled resource consumption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-16T10:17:21.149Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2018-013"
        }
      ],
      "source": {
        "advisory": "VDE-2018-013",
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Denial of service in 750-8xx controller due to uncontrolled resource consumption",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2018-25108",
    "datePublished": "2025-01-16T10:17:21.149Z",
    "dateReserved": "2025-01-15T15:08:51.058Z",
    "dateUpdated": "2025-01-16T14:13:05.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41974 (GCVE-0-2024-41974)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:05 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: BACNet Service Property Modification Due to Permission Misconfiguration in Multiple Devices
Summary
A low privileged remote attacker may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41974",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:12:08.030082Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.186Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:48:08.506Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: BACNet Service Property Modification Due to Permission Misconfiguration in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41974",
    "datePublished": "2024-11-18T09:05:32.043Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.186Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41973 (GCVE-0-2024-41973)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:05 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Remote Arbitrary File Write with Root Privileges in multiple Devices
Summary
A low privileged remote attacker can specify an arbitrary file on the filesystem which may lead to an arbitrary file writes with root privileges.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:13:35.584257Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.344Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can\u0026nbsp;specify an arbitrary file on the filesystem which\u0026nbsp;may lead to an arbitrary file writes with root privileges.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can\u00a0specify an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file writes with root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35 Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:45:53.917Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Remote Arbitrary File Write with Root Privileges in multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41973",
    "datePublished": "2024-11-18T09:05:15.892Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.344Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41972 (GCVE-0-2024-41972)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Arbitrary File Overwrite Leading to Privileged File Read in Multiple Devices
Summary
A low privileged remote attacker can overwrite an arbitrary file on the filesystem which may lead to an arbitrary file read with root privileges.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41972",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T14:53:48.536484Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.494Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can\u0026nbsp;overwrite an arbitrary file on the filesystem which\u0026nbsp;may lead to an arbitrary file read with root privileges.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can\u00a0overwrite an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file read with root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35 Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:43:14.234Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Arbitrary File Overwrite Leading to Privileged File Read in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41972",
    "datePublished": "2024-11-18T09:04:56.284Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41971 (GCVE-0-2024-41971)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Arbitrary File Overwrite in Multiple Devices
Summary
A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41971",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:19:07.273651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:39:34.318Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Arbitrary File Overwrite in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41971",
    "datePublished": "2024-11-18T09:04:42.052Z",
    "dateReserved": "2024-07-25T09:07:31.465Z",
    "dateUpdated": "2025-08-27T21:33:03.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41970 (GCVE-0-2024-41970)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Unauthorized Diagnostic Data Exposure in Multiple Devices
Summary
A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41970",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:17:05.082537Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.735Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:35:53.240Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Unauthorized Diagnostic Data Exposure in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41970",
    "datePublished": "2024-11-18T09:04:27.334Z",
    "dateReserved": "2024-07-25T09:07:31.465Z",
    "dateUpdated": "2025-08-27T21:33:03.735Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41969 (GCVE-0-2024-41969)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-01-30 09:21
VLAI?
Title
WAGO: CODESYS V3 Configuration Authentication Bypass in Multiple Devices
Summary
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41969",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-09T22:09:24.613269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-10T16:59:37.246Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker may\u0026nbsp;modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.\u0026nbsp;\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker may\u00a0modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:21:40.910Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: CODESYS V3 Configuration Authentication Bypass in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41969",
    "datePublished": "2024-11-18T09:04:13.691Z",
    "dateReserved": "2024-07-25T09:07:31.464Z",
    "dateUpdated": "2025-01-30T09:21:40.910Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41967 (GCVE-0-2024-41967)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:03 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Boot Mode Manipulation in Multiple Devices
Summary
A low privileged remote attacker may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41967",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:22:03.669949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.997Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:19:19.853Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Boot Mode Manipulation in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41967",
    "datePublished": "2024-11-18T09:03:57.513Z",
    "dateReserved": "2024-07-25T09:07:31.463Z",
    "dateUpdated": "2025-08-27T21:33:03.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41968 (GCVE-0-2024-41968)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:03 – Updated: 2025-08-27 21:33
VLAI?
Title
WAGO: Docker Settings Manipulation in Multiple Devices
Summary
A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41968",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T14:56:16.336634Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.869Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.\u0026nbsp;\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:20:17.138Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Docker Settings Manipulation in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41968",
    "datePublished": "2024-11-18T09:03:20.948Z",
    "dateReserved": "2024-07-25T09:07:31.463Z",
    "dateUpdated": "2025-08-27T21:33:03.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-25090 (GCVE-0-2018-25090)

Vulnerability from cvelistv5 – Published: 2024-03-13 08:32 – Updated: 2024-08-05 15:22
VLAI?
Title
Wago: Improper Neutralization of Input During Web Page Generation in multiple devices
Summary
An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required. This leads to a limited impact of confidentiality and integrity but no impact of availability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T12:33:48.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-25090",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-05T15:21:55.909544Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:22:05.933Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet/IP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet MS/TP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fieldbus Coupler Ethernet 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required.\u0026nbsp;This leads to a limited impact of confidentiality and integrity but no impact of availability."
            }
          ],
          "value": "An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required.\u00a0This leads to a limited impact of confidentiality and integrity but no impact of availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-13T08:32:17.180Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-039",
        "defect": [
          "CERT@VDE#64546"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Wago: Improper Neutralization of Input During Web Page Generation in multiple devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2018-25090",
    "datePublished": "2024-03-13T08:32:17.180Z",
    "dateReserved": "2023-09-14T13:00:21.075Z",
    "dateUpdated": "2024-08-05T15:22:05.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-10123 (GCVE-0-2015-10123)

Vulnerability from cvelistv5 – Published: 2024-03-13 08:31 – Updated: 2024-10-23 09:40
VLAI?
Title
Wago: Buffer Copy without Checking Size of Input in wbm of multiple products
Summary
An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device.
CWE
  • CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:58:26.532Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:wago:750-352_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-352_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-831_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-829_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-852_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-880_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-881_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-882_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-885_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-889_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-884_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-884_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2015-10123",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-06T18:34:04.204030Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:37:09.871Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet/IP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet MS/TP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fieldbus Coupler Ethernet 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device.\u003cbr\u003e"
            }
          ],
          "value": "An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-23T09:40:12.408Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-039",
        "defect": [
          "CERT@VDE#64546"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Wago: Buffer Copy without Checking Size of Input in wbm of multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2015-10123",
    "datePublished": "2024-03-13T08:31:55.341Z",
    "dateReserved": "2023-09-14T13:00:03.904Z",
    "dateUpdated": "2024-10-23T09:40:12.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5188 (GCVE-0-2023-5188)

Vulnerability from cvelistv5 – Published: 2023-12-05 07:19 – Updated: 2024-08-02 07:52
VLAI?
Title
WAGO Improper Input Validation in IEC61850 Server / Telecontrol
Summary
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Credits
Sofia Pisani
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:52:07.789Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-044/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Telecontrol Configurator",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "*"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WagoAppRTU",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.4.6.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Sofia Pisani"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device."
            }
          ],
          "value": "The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-14T14:09:31.201Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-044",
        "defect": [
          "CERT@VDE#64591"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO Improper Input Validation in IEC61850 Server / Telecontrol",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-5188",
    "datePublished": "2023-12-05T07:19:08.528Z",
    "dateReserved": "2023-09-26T05:25:11.663Z",
    "dateUpdated": "2024-08-02T07:52:07.789Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-20994 (GCVE-0-2021-20994)

Vulnerability from cvelistv5 – Published: 2021-05-13 13:45 – Updated: 2024-09-17 01:16
VLAI?
Title
WAGO: Managed Switches: Reflected Cross-site Scripting
Summary
In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
CWE
  • CWE-79 - Cross-site Scripting (XSS)
Assigner
References
Impacted products
Vendor Product Version
WAGO 0852-0303 Affected: unspecified , ≤ V1.2.3.S0 (custom)
Create a notification for this product.
    WAGO 0852-1305 Affected: unspecified , ≤ V1.1.7.S0 (custom)
Create a notification for this product.
    WAGO 0852-1505 Affected: unspecified , ≤ V1.1.6.S0 (custom)
Create a notification for this product.
    WAGO 0852-1305/000-001 Affected: unspecified , ≤ V1.0.4.S0 (custom)
Create a notification for this product.
    WAGO 0852-1505/000-001 Affected: unspecified , ≤ V1.0.4.S0 (custom)
Create a notification for this product.
Credits
Dr. Tobias Augustin and Stephan Tigges of IKS – Institut für Kooperative Systeme GmbH, Kai Gaul and Jan Rübenach of ABO Wind AG, coordinated by CERT@VDE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:53:23.102Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "0852-0303",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "V1.2.3.S0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "0852-1305",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "V1.1.7.S0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "0852-1505",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "V1.1.6.S0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "0852-1305/000-001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "V1.0.4.S0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "0852-1505/000-001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "V1.0.4.S0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Dr. Tobias Augustin and Stephan Tigges of IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH, Kai Gaul and Jan R\u00fcbenach of ABO Wind AG, coordinated by CERT@VDE"
        }
      ],
      "datePublic": "2021-05-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-05-13T13:45:24",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases:\nItem number [FW version]\n0852-0303 (HW \u003c 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide.\n0852-0303 (HW \u003e=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide.\n0852-1305 [V1.1.8.S0]\n0852-1505 [V1.1.7.S0]\n0852-1305/000-001 [V1.1.4.S0]\n0852-1505/000-001 [V1.1.4.S0]"
        }
      ],
      "source": {
        "advisory": "VDE-2021-013",
        "defect": [
          "VDE-2021-013"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Managed Switches: Reflected Cross-site Scripting",
      "workarounds": [
        {
          "lang": "en",
          "value": "Disable the web server of the device.\nUse the CLI interface of the device.\nUpdate to the latest firmware.\nRestrict network access to the device.\nDo not directly connect the device to the internet."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2021-05-05T10:00:00.000Z",
          "ID": "CVE-2021-20994",
          "STATE": "PUBLIC",
          "TITLE": "WAGO: Managed Switches: Reflected Cross-site Scripting"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "0852-0303",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V1.2.3.S0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "0852-1305",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V1.1.7.S0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "0852-1505",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V1.1.6.S0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "0852-1305/000-001",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V1.0.4.S0"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "0852-1505/000-001",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "V1.0.4.S0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "WAGO"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Dr. Tobias Augustin and Stephan Tigges of IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH, Kai Gaul and Jan R\u00fcbenach of ABO Wind AG, coordinated by CERT@VDE"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2021-013",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases:\nItem number [FW version]\n0852-0303 (HW \u003c 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide.\n0852-0303 (HW \u003e=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide.\n0852-1305 [V1.1.8.S0]\n0852-1505 [V1.1.7.S0]\n0852-1305/000-001 [V1.1.4.S0]\n0852-1505/000-001 [V1.1.4.S0]"
          }
        ],
        "source": {
          "advisory": "VDE-2021-013",
          "defect": [
            "VDE-2021-013"
          ],
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Disable the web server of the device.\nUse the CLI interface of the device.\nUpdate to the latest firmware.\nRestrict network access to the device.\nDo not directly connect the device to the internet."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2021-20994",
    "datePublished": "2021-05-13T13:45:24.684398Z",
    "dateReserved": "2020-12-17T00:00:00",
    "dateUpdated": "2024-09-17T01:16:25.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12525 (GCVE-0-2020-12525)

Vulnerability from cvelistv5 – Published: 2021-01-22 19:01 – Updated: 2024-09-16 23:11
VLAI?
Title
WAGO/M&M Software Deserialization of untrusted data in fdtCONTAINER component
Summary
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
CWE
  • CWE-502 - Deserialization of Untrusted Data
Assigner
Impacted products
Vendor Product Version
M&M Software fdtCONTAINER Component Affected: unspecified , < 3.5 (custom)
Affected: 3.5 , < 3.5.20304.x (custom)
Affected: 3.6 , < 3.6.20304.x (custom)
Create a notification for this product.
    M&M Software fdtCONTAINER Application Affected: unspecified , < 4.5 (custom)
Affected: 4.5 , < 4.5.20304.x (custom)
Affected: 4.6 , < 4.6.20304.x (custom)
Create a notification for this product.
    M&M Software dtmlINSPECTOR Affected: 3
Create a notification for this product.
    Pepperl+Fuchs/PACTware PACTware Affected: unspecified , ≤ 5.0.5.31 (custom)
Create a notification for this product.
    Weidmüller WI Manager Affected: unspecified , ≤ 2.5.1 (custom)
Create a notification for this product.
Credits
Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:52.074Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "fdtCONTAINER Component",
          "vendor": "M\u0026M Software",
          "versions": [
            {
              "lessThan": "3.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "3.5.20304.x",
              "status": "affected",
              "version": "3.5",
              "versionType": "custom"
            },
            {
              "lessThan": "3.6.20304.x",
              "status": "affected",
              "version": "3.6",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "fdtCONTAINER Application",
          "vendor": "M\u0026M Software",
          "versions": [
            {
              "lessThan": "4.5",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThan": "4.5.20304.x",
              "status": "affected",
              "version": "4.5",
              "versionType": "custom"
            },
            {
              "lessThan": "4.6.20304.x",
              "status": "affected",
              "version": "4.6",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "dtmlINSPECTOR",
          "vendor": "M\u0026M Software",
          "versions": [
            {
              "status": "affected",
              "version": "3"
            }
          ]
        },
        {
          "product": "PACTware",
          "vendor": "Pepperl+Fuchs/PACTware",
          "versions": [
            {
              "lessThanOrEqual": "5.0.5.31",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "WI Manager",
          "vendor": "Weidm\u00fcller",
          "versions": [
            {
              "lessThanOrEqual": "2.5.1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE"
        }
      ],
      "datePublic": "2021-01-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "M\u0026M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-29T14:58:35",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "M\u0026M Software provides two updated fdtCONTAINER component trees (3.6.20304.x \u003c 3.7 and \u003e= 3.7) see advisory https://cert.vde.com/en-us/advisories/vde-2020-048 for details."
        }
      ],
      "source": {
        "advisory": "VDE-2020-048",
        "defect": [
          "VDE-2020-048"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO/M\u0026M Software Deserialization of untrusted data in fdtCONTAINER component",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2021-01-14T11:00:00.000Z",
          "ID": "CVE-2020-12525",
          "STATE": "PUBLIC",
          "TITLE": "WAGO/M\u0026M Software Deserialization of untrusted data in fdtCONTAINER component"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "fdtCONTAINER Component",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "3.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "3.5",
                            "version_value": "3.5.20304.x"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "3.6",
                            "version_value": "3.6.20304.x"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "fdtCONTAINER Application",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "4.5"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "4.5",
                            "version_value": "4.5.20304.x"
                          },
                          {
                            "version_affected": "\u003c",
                            "version_name": "4.6",
                            "version_value": "4.6.20304.x"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "dtmlINSPECTOR",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "3"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "M\u0026M Software"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "PACTware",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "5.0.5.31"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Pepperl+Fuchs/PACTware"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WI Manager",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.5.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Weidm\u00fcller"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Reported by a customer of the fdtCONTAINER component. Coordinated by CERT@VDE"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "M\u0026M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-502 Deserialization of Untrusted Data"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2020-038",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en-us/advisories/vde-2020-038"
            },
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-021-05"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "M\u0026M Software provides two updated fdtCONTAINER component trees (3.6.20304.x \u003c 3.7 and \u003e= 3.7) see advisory https://cert.vde.com/en-us/advisories/vde-2020-048 for details."
          }
        ],
        "source": {
          "advisory": "VDE-2020-048",
          "defect": [
            "VDE-2020-048"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2020-12525",
    "datePublished": "2021-01-22T19:01:56.886079Z",
    "dateReserved": "2020-04-30T00:00:00",
    "dateUpdated": "2024-09-16T23:11:43.568Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12516 (GCVE-0-2020-12516)

Vulnerability from cvelistv5 – Published: 2020-12-10 03:04 – Updated: 2024-09-16 22:14
VLAI?
Title
WAGO: PLC families 750-88x and 750-352 prone to DoS attack
Summary
Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.
CWE
  • CWE-400 - Uncontrolled Resource Consumption
Assigner
Credits
These vulnerabilities were reported to WAGO by: William Knowles, Applied Risk. Coordination done by CERT@VDE.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:56:52.085Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-01"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en-us/advisories/vde-2020-042"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-331/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-352",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-829",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-831/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-852",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-880/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-881",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-882",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-885",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        },
        {
          "product": "750-889",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW1\u003c=FW10"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "These vulnerabilities were reported to WAGO by: William Knowles, Applied Risk. Coordination done by CERT@VDE."
        }
      ],
      "datePublic": "2020-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-12-22T21:14:49",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-01"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en-us/advisories/vde-2020-042"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Update the device to the latest FW version."
        }
      ],
      "source": {
        "advisory": "VDE-2020-042",
        "defect": [
          "VDE-2020-042"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: PLC families 750-88x and 750-352 prone to DoS attack",
      "workarounds": [
        {
          "lang": "en",
          "value": "Restrict network access to the device.\nDo not directly connect the device to the internet\nDisable unused TCP/UDP-ports"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "",
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2020-12-09T09:00:00.000Z",
          "ID": "CVE-2020-12516",
          "STATE": "PUBLIC",
          "TITLE": "WAGO: PLC families 750-88x and 750-352 prone to DoS attack"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "750-331/xxx-xxx",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-352",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-829",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-831/xxx-xxx",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-852",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-880/xxx-xxx",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-881",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-882",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-885",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "750-889",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "FW1\u003c=FW10"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "WAGO"
              }
            ]
          }
        },
        "configuration": [],
        "credit": [
          {
            "lang": "eng",
            "value": "These vulnerabilities were reported to WAGO by: William Knowles, Applied Risk. Coordination done by CERT@VDE."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack."
            }
          ]
        },
        "exploit": [],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-400 Uncontrolled Resource Consumption"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-01",
              "refsource": "MISC",
              "url": "https://us-cert.cisa.gov/ics/advisories/icsa-20-308-01"
            },
            {
              "name": "https://cert.vde.com/en-us/advisories/vde-2020-042",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en-us/advisories/vde-2020-042"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Update the device to the latest FW version."
          }
        ],
        "source": {
          "advisory": "VDE-2020-042",
          "defect": [
            "VDE-2020-042"
          ],
          "discovery": "UNKNOWN"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Restrict network access to the device.\nDo not directly connect the device to the internet\nDisable unused TCP/UDP-ports"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2020-12516",
    "datePublished": "2020-12-10T03:04:17.186342Z",
    "dateReserved": "2020-04-30T00:00:00",
    "dateUpdated": "2024-09-16T22:14:10.360Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5172 (GCVE-0-2019-5172)

Vulnerability from cvelistv5 – Published: 2020-03-11 22:18 – Updated: 2024-08-04 19:47
VLAI?
Summary
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=<contents of ntp node> using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many ntp entries will be parsed from the xml file.
Severity ?
No CVSS data available.
CWE
  • command injection
Assigner
References
Impacted products
Vendor Product Version
Wago WAGO PFC200 Affected: Firmware version 03.02.02(14)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.615Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WAGO PFC200",
          "vendor": "Wago",
          "versions": [
            {
              "status": "affected",
              "version": "Firmware version 03.02.02(14)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable command injection vulnerability exists in the iocheckd service \u2018I/O-Check\u2019 function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=\u003ccontents of ntp node\u003e using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many ntp entries will be parsed from the xml file."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "command injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-11T22:18:37",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2019-5172",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WAGO PFC200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Firmware version 03.02.02(14)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Wago"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable command injection vulnerability exists in the iocheckd service \u2018I/O-Check\u2019 function of the WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e840 the extracted ntp value from the xml file is used as an argument to /etc/config-tools/config_sntp time-server-%d=\u003ccontents of ntp node\u003e using sprintf(). This command is later executed via a call to system(). This is done in a loop and there is no limit to how many ntp entries will be parsed from the xml file."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "command injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2019-5172",
    "datePublished": "2020-03-11T22:18:37",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.615Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5173 (GCVE-0-2019-5173)

Vulnerability from cvelistv5 – Published: 2020-03-11 22:18 – Updated: 2024-08-04 19:47
VLAI?
Summary
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=<contents of state node> using sprintf(). This command is later executed via a call to system().
Severity ?
No CVSS data available.
CWE
  • command injection
Assigner
References
Impacted products
Vendor Product Version
Wago WAGO PFC200 Affected: Firmware version 03.02.02(14)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.743Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WAGO PFC200",
          "vendor": "Wago",
          "versions": [
            {
              "status": "affected",
              "version": "Firmware version 03.02.02(14)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable command injection vulnerability exists in the iocheckd service \u2018I/O-Check\u2019 function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=\u003ccontents of state node\u003e using sprintf(). This command is later executed via a call to system()."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "command injection",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-11T22:18:28",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2019-5173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WAGO PFC200",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Firmware version 03.02.02(14)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Wago"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable command injection vulnerability exists in the iocheckd service \u2018I/O-Check\u2019 function of the WAGO PFC 200 Firmware version 03.02.02(14). A specially crafted XML cache file written to a specific location on the device can be used to inject OS commands. An attacker can send a specially crafted packet to trigger the parsing of this cache file. At 0x1e9fc the extracted state value from the xml file is used as an argument to /etc/config-tools/config_interfaces interface=X1 state=\u003ccontents of state node\u003e using sprintf(). This command is later executed via a call to system()."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "command injection"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2019-5173",
    "datePublished": "2020-03-11T22:18:28",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.743Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5106 (GCVE-0-2019-5106)

Vulnerability from cvelistv5 – Published: 2020-03-10 23:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.
Severity ?
No CVSS data available.
CWE
  • Use of a Broken or Risky Cryptographic Algorithm
Assigner
References
Impacted products
Vendor Product Version
Wago WAGO e!Cockpit Affected: 1.5.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:55.965Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WAGO e!Cockpit",
          "vendor": "Wago",
          "versions": [
            {
              "status": "affected",
              "version": "1.5.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Use of a Broken or Risky Cryptographic Algorithm",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-10T23:41:32",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2019-5106",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WAGO e!Cockpit",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.5.1.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Wago"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Use of a Broken or Risky Cryptographic Algorithm"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2019-5106",
    "datePublished": "2020-03-10T23:41:32",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:55.965Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5107 (GCVE-0-2019-5107)

Vulnerability from cvelistv5 – Published: 2020-03-10 23:41 – Updated: 2024-08-04 19:47
VLAI?
Summary
A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints.
Severity ?
No CVSS data available.
CWE
  • Cleartext Transmission of Sensitive Information
Assigner
References
Impacted products
Vendor Product Version
Wago WAGO e!Cockpit Affected: 1.5.1.1
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WAGO e!Cockpit",
          "vendor": "Wago",
          "versions": [
            {
              "status": "affected",
              "version": "1.5.1.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Cleartext Transmission of Sensitive Information",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-10T23:41:29",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2019-5107",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WAGO e!Cockpit",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.5.1.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Wago"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A cleartext transmission vulnerability exists in the network communication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to network traffic can easily intercept, interpret, and manipulate data coming from, or destined for e!Cockpit. This includes passwords, configurations, and binaries being transferred to endpoints."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Cleartext Transmission of Sensitive Information"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0899"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2019-5107",
    "datePublished": "2020-03-10T23:41:29",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.719Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5158 (GCVE-0-2019-5158)

Vulnerability from cvelistv5 – Published: 2020-03-10 23:14 – Updated: 2024-08-04 19:47
VLAI?
Summary
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.
Severity ?
No CVSS data available.
CWE
  • improper input validation
Assigner
References
Impacted products
Vendor Product Version
Wago WAGO e!COCKPIT Affected: 1.6.1.5
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:47:56.569Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "WAGO e!COCKPIT",
          "vendor": "Wago",
          "versions": [
            {
              "status": "affected",
              "version": "1.6.1.5"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "improper input validation",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-10T23:14:27",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2019-5158",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "WAGO e!COCKPIT",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "1.6.1.5"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Wago"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "improper input validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2019-5158",
    "datePublished": "2020-03-10T23:14:27",
    "dateReserved": "2019-01-04T00:00:00",
    "dateUpdated": "2024-08-04T19:47:56.569Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}