Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-20994 (GCVE-0-2021-20994)
Vulnerability from cvelistv5 – Published: 2021-05-13 13:45 – Updated: 2024-09-17 01:16- CWE-79 - Cross-site Scripting (XSS)
| URL | Tags |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-013 | x_refsource_CONFIRM |
| Vendor | Product | Version | |
|---|---|---|---|
| WAGO | 0852-0303 |
Affected:
unspecified , ≤ V1.2.3.S0
(custom)
|
|
| WAGO | 0852-1305 |
Affected:
unspecified , ≤ V1.1.7.S0
(custom)
|
|
| WAGO | 0852-1505 |
Affected:
unspecified , ≤ V1.1.6.S0
(custom)
|
|
| WAGO | 0852-1305/000-001 |
Affected:
unspecified , ≤ V1.0.4.S0
(custom)
|
|
| WAGO | 0852-1505/000-001 |
Affected:
unspecified , ≤ V1.0.4.S0
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T17:53:23.102Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "0852-0303",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "V1.2.3.S0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "0852-1305",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "V1.1.7.S0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "0852-1505",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "V1.1.6.S0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "0852-1305/000-001",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "V1.0.4.S0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "0852-1505/000-001",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "V1.0.4.S0",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Dr. Tobias Augustin and Stephan Tigges of IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH, Kai Gaul and Jan R\u00fcbenach of ABO Wind AG, coordinated by CERT@VDE"
}
],
"datePublic": "2021-05-05T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-13T13:45:24.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
],
"solutions": [
{
"lang": "en",
"value": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases:\nItem number [FW version]\n0852-0303 (HW \u003c 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide.\n0852-0303 (HW \u003e=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide.\n0852-1305 [V1.1.8.S0]\n0852-1505 [V1.1.7.S0]\n0852-1305/000-001 [V1.1.4.S0]\n0852-1505/000-001 [V1.1.4.S0]"
}
],
"source": {
"advisory": "VDE-2021-013",
"defect": [
"VDE-2021-013"
],
"discovery": "EXTERNAL"
},
"title": "WAGO: Managed Switches: Reflected Cross-site Scripting",
"workarounds": [
{
"lang": "en",
"value": "Disable the web server of the device.\nUse the CLI interface of the device.\nUpdate to the latest firmware.\nRestrict network access to the device.\nDo not directly connect the device to the internet."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-05-05T10:00:00.000Z",
"ID": "CVE-2021-20994",
"STATE": "PUBLIC",
"TITLE": "WAGO: Managed Switches: Reflected Cross-site Scripting"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "0852-0303",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.2.3.S0"
}
]
}
},
{
"product_name": "0852-1305",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.1.7.S0"
}
]
}
},
{
"product_name": "0852-1505",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.1.6.S0"
}
]
}
},
{
"product_name": "0852-1305/000-001",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.0.4.S0"
}
]
}
},
{
"product_name": "0852-1505/000-001",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.0.4.S0"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Dr. Tobias Augustin and Stephan Tigges of IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH, Kai Gaul and Jan R\u00fcbenach of ABO Wind AG, coordinated by CERT@VDE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-013",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
]
},
"solution": [
{
"lang": "en",
"value": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases:\nItem number [FW version]\n0852-0303 (HW \u003c 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide.\n0852-0303 (HW \u003e=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide.\n0852-1305 [V1.1.8.S0]\n0852-1505 [V1.1.7.S0]\n0852-1305/000-001 [V1.1.4.S0]\n0852-1505/000-001 [V1.1.4.S0]"
}
],
"source": {
"advisory": "VDE-2021-013",
"defect": [
"VDE-2021-013"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "Disable the web server of the device.\nUse the CLI interface of the device.\nUpdate to the latest firmware.\nRestrict network access to the device.\nDo not directly connect the device to the internet."
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-20994",
"datePublished": "2021-05-13T13:45:24.684Z",
"dateReserved": "2020-12-17T00:00:00.000Z",
"dateUpdated": "2024-09-17T01:16:25.472Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-20994",
"date": "2026-05-16",
"epss": "0.00391",
"percentile": "0.60257"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-20994\",\"sourceIdentifier\":\"info@cert.vde.com\",\"published\":\"2021-05-13T14:15:17.970\",\"lastModified\":\"2024-11-21T05:47:21.880\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.\"},{\"lang\":\"es\",\"value\":\"En m\u00faltiples switches administrados por WAGO en diferentes versiones, un atacante puede enga\u00f1ar a un usuario leg\u00edtimo para que haga clic en un enlace para inyectar un posible c\u00f3digo malicioso en la Administraci\u00f3n Basada en Web\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"info@cert.vde.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wago:0852-0303_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.3.s0\",\"matchCriteriaId\":\"F5CF4A95-5671-4AA5-8F27-B16A681AE82E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wago:0852-0303:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3611D06D-0A64-4817-9142-5F8B9B3CB763\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wago:0852-1305_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.7.s0\",\"matchCriteriaId\":\"A48F91CD-922D-4E76-AC7A-E132F9E26A79\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wago:0852-1305:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FEC92F0-ED21-4BF9-AC9A-424EE913A6E7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wago:0852-1505_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.6.s0\",\"matchCriteriaId\":\"BDF3F15D-6BF7-4C47-8552-9A9275FD5066\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wago:0852-1505:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"991752B3-8BE0-4D10-9240-51B0E4050358\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wago:0852-1305\\\\/000-001_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.s0\",\"matchCriteriaId\":\"2BF24302-7E5C-41D7-AB57-064B94D7AF00\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wago:0852-1305\\\\/000-001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A91A50A-2BBB-4667-8764-C3D6C7717C3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:wago:0852-1505\\\\/000-001_firmware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.0.4.s0\",\"matchCriteriaId\":\"A28B4348-CA65-406A-BDD7-748E5ED9C2B2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:wago:0852-1505\\\\/000-001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7F57D47-2310-4389-BE4C-7545A7DB8C07\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2021-013\",\"source\":\"info@cert.vde.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2021-013\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
VDE-2021-013
Vulnerability from csaf_wagogmbhcokg - Published: 2021-05-05 08:54 - Updated: 2025-05-14 12:28In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-32001 | — | ||
| Unresolved product id: CSAFPID-32002 | — | ||
| Unresolved product id: CSAFPID-32003 | — | ||
| Unresolved product id: CSAFPID-32004 | — | ||
| Unresolved product id: CSAFPID-32005 | — | ||
| Unresolved product id: CSAFPID-32006 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: CSAFPID-31001 | — | ||
| Unresolved product id: CSAFPID-31002 | — | ||
| Unresolved product id: CSAFPID-31003 | — | ||
| Unresolved product id: CSAFPID-31004 | — | ||
| Unresolved product id: CSAFPID-31005 | — | ||
| Unresolved product id: CSAFPID-31006 | — |
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Dr. Tobias Augustin",
"Stephan Tigges"
],
"organization": "IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH",
"summary": "reported"
},
{
"names": [
"Kai Gaul",
"Jan R\u00fcbenach"
],
"organization": "ABO Wind AG",
"summary": "reported"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "The Web-Based Management (WBM) of WAGOs industrial managed switches is typically used for administration, commissioning and updates.\n\nThe reported vulnerabilities allow an attacker with access to the device and the Web-Based Management, to install malware, access to password hashes and create user with admin credentials.",
"title": "Summary"
},
{
"category": "description",
"text": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"title": "Mitigation"
},
{
"category": "description",
"text": "By exploiting the described vulnerabilities, the attacker potentially is able to manipulate or to disrupt the device.",
"title": "Impact"
},
{
"category": "description",
"text": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "external",
"summary": "WAGO advisory overview at CERT@VDE",
"url": "https://certvde.com/en/advisories/vendor/wago/"
},
{
"category": "self",
"summary": "VDE-2021-013: WAGO: Multiple Vulnerabilities in the Web-Based Management Interface - HTML",
"url": "https://certvde.com/en/advisories/VDE-2021-013"
},
{
"category": "self",
"summary": "VDE-2021-013: WAGO: Multiple Vulnerabilities in the Web-Based Management Interface - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-013.json"
}
],
"title": "WAGO: Multiple Vulnerabilities in the Web-Based Management Interface",
"tracking": {
"aliases": [
"VDE-2021-013"
],
"current_release_date": "2025-05-14T12:28:19.000Z",
"generator": {
"date": "2025-01-27T10:24:13.567Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.17"
}
},
"id": "VDE-2021-013",
"initial_release_date": "2021-05-05T08:54:00.000Z",
"revision_history": [
{
"date": "2021-06-23T12:16:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2025-05-14T12:28:19.000Z",
"number": "2",
"summary": "Fix: version space, added distribution"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "0852-1305",
"product": {
"name": "0852-1305",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"2688394"
]
}
}
},
{
"category": "product_name",
"name": "0852-1305/000-001",
"product": {
"name": "0852-1305/000-001",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2688459"
]
}
}
},
{
"category": "product_name",
"name": "0852-1505",
"product": {
"name": "0852-1505",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"2702177"
]
}
}
},
{
"category": "product_name",
"name": "0852-1505/000-001",
"product": {
"name": "0852-1505/000-001",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"2701949"
]
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "(HW\u003c3)*",
"product": {
"name": "Hardware 0852-0303 (HW\u003c3)*",
"product_id": "CSAFPID-11005"
}
},
{
"category": "product_version_range",
"name": "(HW\u003e=3)*",
"product": {
"name": "Hardware 0852-0303 (HW\u003e=3)*",
"product_id": "CSAFPID-11006"
}
}
],
"category": "product_name",
"name": "0852-0303"
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.2.3.S0",
"product": {
"name": "Firmware \u003c=V1.2.3.S0",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c=V1.1.7.S0",
"product": {
"name": "Firmware \u003c=V1.1.7.S0",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version_range",
"name": "\u003c=V1.0.4.S0",
"product": {
"name": "Firmware \u003c=V1.0.4.S0",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version_range",
"name": "\u003c=V1.1.6.S0",
"product": {
"name": "Firmware \u003c=V1.1.6.S0",
"product_id": "CSAFPID-21004"
}
},
{
"category": "product_version",
"name": "V1.2.5.S0",
"product": {
"name": "Firmware V1.2.5.S0",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "V1.2.3.S1",
"product": {
"name": "Firmware V1.2.3.S1",
"product_id": "CSAFPID-22002"
}
},
{
"category": "product_version",
"name": "V1.1.8.S0",
"product": {
"name": "Firmware V1.1.8.S0",
"product_id": "CSAFPID-22003"
}
},
{
"category": "product_version",
"name": "V1.1.7.S0",
"product": {
"name": "Firmware V1.1.7.S0",
"product_id": "CSAFPID-22004"
}
},
{
"category": "product_version",
"name": "V1.1.4.S0",
"product": {
"name": "Firmware V1.1.4.S0",
"product_id": "CSAFPID-22005"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
],
"summary": "Affected Products"
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"summary": "Fixed Products"
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.2.3.S0 installed on Hardware 0852-0303 (HW\u003c3)*",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.2.3.S0 installed on Hardware 0852-0303 (HW\u003e=3)*",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.1.7.S0 installed on 0852-1305",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.0.4.S0 installed on 0852-1305/000-001",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.1.6.S0 installed on 0852-1505",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=V1.0.4.S0 installed on 0852-1505/000-001",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.2.5.S0 installed on Hardware 0852-0303 (HW\u003c3)*",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.2.3.S1 installed on Hardware 0852-0303 (HW\u003e=3)*",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.8.S0 installed on 0852-1305",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.8.S0 installed on 0852-1505",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22003",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.4.S0 installed on 0852-1305/000-001",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22005",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware V1.1.4.S0 installed on 0852-1505/000-001",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22005",
"relates_to_product_reference": "CSAFPID-11004"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20998",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20998"
},
{
"cve": "CVE-2021-20995",
"cwe": {
"id": "CWE-312",
"name": "Cleartext Storage of Sensitive Information"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions the webserver cookies of the web based UI contain user credentials.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20995"
},
{
"cve": "CVE-2021-20997",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20997"
},
{
"cve": "CVE-2021-20994",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.1,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.1,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20994"
},
{
"cve": "CVE-2021-20993",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20993"
},
{
"cve": "CVE-2021-20996",
"cwe": {
"id": "CWE-732",
"name": "Incorrect Permission Assignment for Critical Resource"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions special crafted requests can lead to cookies being transferred to third parties.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Disable the web server of the device.\n- Use the CLI interface of the device.\n- Update to the latest firmware.\n- Restrict network access to the device.\n- Do not directly connect the device to the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases.\n| **Item Number** | **FW Version** |\n|------------------------|-----------------|\n| 0852-0303 (HW\u003c3)* | V1.2.5.S0 |\n| 0852-0303 (HW\u003e=3)* | V1.2.3.S1 |\n| 0852-1305 | V1.1.8.S0 |\n| 0852-1505 | V1.1.7.S0 |\n| 0852-1305/000-001 | V1.1.4.S0 |\n| 0852-1505/000-001 | V1.1.4.S0 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006"
]
}
],
"title": "CVE-2021-20996"
}
]
}
FKIE_CVE-2021-20994
Vulnerability from fkie_nvd - Published: 2021-05-13 14:15 - Updated: 2024-11-21 05:476.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en-us/advisories/vde-2021-013 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2021-013 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| wago | 0852-0303_firmware | * | |
| wago | 0852-0303 | - | |
| wago | 0852-1305_firmware | * | |
| wago | 0852-1305 | - | |
| wago | 0852-1505_firmware | * | |
| wago | 0852-1505 | - | |
| wago | 0852-1305\/000-001_firmware | * | |
| wago | 0852-1305\/000-001 | - | |
| wago | 0852-1505\/000-001_firmware | * | |
| wago | 0852-1505\/000-001 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:0852-0303_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5CF4A95-5671-4AA5-8F27-B16A681AE82E",
"versionEndIncluding": "1.2.3.s0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:0852-0303:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3611D06D-0A64-4817-9142-5F8B9B3CB763",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:0852-1305_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A48F91CD-922D-4E76-AC7A-E132F9E26A79",
"versionEndIncluding": "1.1.7.s0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:0852-1305:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9FEC92F0-ED21-4BF9-AC9A-424EE913A6E7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:0852-1505_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF3F15D-6BF7-4C47-8552-9A9275FD5066",
"versionEndIncluding": "1.1.6.s0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:0852-1505:-:*:*:*:*:*:*:*",
"matchCriteriaId": "991752B3-8BE0-4D10-9240-51B0E4050358",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:0852-1305\\/000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BF24302-7E5C-41D7-AB57-064B94D7AF00",
"versionEndIncluding": "1.0.4.s0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:0852-1305\\/000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9A91A50A-2BBB-4667-8764-C3D6C7717C3B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:0852-1505\\/000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A28B4348-CA65-406A-BDD7-748E5ED9C2B2",
"versionEndIncluding": "1.0.4.s0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:0852-1505\\/000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F7F57D47-2310-4389-BE4C-7545A7DB8C07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
},
{
"lang": "es",
"value": "En m\u00faltiples switches administrados por WAGO en diferentes versiones, un atacante puede enga\u00f1ar a un usuario leg\u00edtimo para que haga clic en un enlace para inyectar un posible c\u00f3digo malicioso en la Administraci\u00f3n Basada en Web"
}
],
"id": "CVE-2021-20994",
"lastModified": "2024-11-21T05:47:21.880",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-05-13T14:15:17.970",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
VDE-2021-036
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2021-08-04 07:56 - Updated: 2025-05-14 12:28In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Activation Wizard <=1.4
PHOENIX CONTACT / Software / Activation Wizard
|
<=1.4 |
Mitigation
Vendor Fix
|
|
|
E-Mobility Charging Suite license codes for EV Charging Suite Setup <=1.7.3
PHOENIX CONTACT / Software / E-Mobility Charging Suite license codes for EV Charging Suite Setup
|
1153509115351310869291153516108689111535081153520108692110868891086920
|
<=1.7.3 |
Mitigation
Vendor Fix
|
|
FL Network Manager <=5.0
PHOENIX CONTACT / Software / FL Network Manager
|
2702889
|
<=5.0 |
Mitigation
Vendor Fix
|
|
IOL-CONF <=1.7.0
PHOENIX CONTACT / Software / IOL-CONF
|
1083065
|
<=1.7.0 |
Mitigation
Vendor Fix
|
|
PLCNEXT ENGINEER EDU LIC <=2021.06
PHOENIX CONTACT / Software / PLCNEXT ENGINEER EDU LIC
|
1165889
|
<=2021.06 |
Mitigation
Vendor Fix
|
In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Activation Wizard <=1.4
PHOENIX CONTACT / Software / Activation Wizard
|
<=1.4 |
Mitigation
Vendor Fix
|
|
|
E-Mobility Charging Suite license codes for EV Charging Suite Setup <=1.7.3
PHOENIX CONTACT / Software / E-Mobility Charging Suite license codes for EV Charging Suite Setup
|
1153509115351310869291153516108689111535081153520108692110868891086920
|
<=1.7.3 |
Mitigation
Vendor Fix
|
|
FL Network Manager <=5.0
PHOENIX CONTACT / Software / FL Network Manager
|
2702889
|
<=5.0 |
Mitigation
Vendor Fix
|
|
IOL-CONF <=1.7.0
PHOENIX CONTACT / Software / IOL-CONF
|
1083065
|
<=1.7.0 |
Mitigation
Vendor Fix
|
|
PLCNEXT ENGINEER EDU LIC <=2021.06
PHOENIX CONTACT / Software / PLCNEXT ENGINEER EDU LIC
|
1165889
|
<=2021.06 |
Mitigation
Vendor Fix
|
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"organization": "Tenable",
"summary": "discovered and reported to WIBU Systems"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "summary",
"text": "Please consult the CVE entries above for more details.",
"title": "Summary"
},
{
"category": "description",
"text": "An attacker may use the above-described vulnerabilities to perform a Denial of Service attack.\nPhoenix Contact devices using CodeMeter embedded are not affected by these vulnerabilities.",
"title": "Impact"
},
{
"category": "description",
"text": "1. Use general security best practices to protect systems from local and network attacks like described in the application node AH EN INDUSTRIAL SECURITY external link.\n2. Run CodeMeter as client only and use localhost as binding for the CodeMeter communication. With binding to localhost an attack is no longer possible via remote network connection. The network server is disabled by default. If it is not possible to disable the network server, using a host-based firewall to restrict access to the CmLAN port can reduce the risk.\n3. The CmWAN server is disabled by default. Please check if CmWAN is enabled and disable the feature if it is not needed.\n4. Run the CmWAN server only behind a reverse proxy with user authentication to prevent attacks from unauthenticated users. The risk of an unauthenticated attacker can be further reduced by using a host-based firewall that only allows the reverse proxy to access the CmWAN port.",
"title": "Mitigation"
},
{
"category": "description",
"text": "PHOENIX CONTACT strongly recommends affected Users to upgrade to Codemeter V7.21a, which fixes these vulnerabilities. Wibu-Systems has already published this update for CodeMeter on their homepage. Since this current version of CodeMeter V7.21a has not yet been incorporated into Phoenix Contact products, we strongly recommend to download and install the current CodeMeter version directly from the Wibu-Systems homepage.",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PHOENIX CONTACT advisory overview at CERT@VDE",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2021-036: PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a - HTML",
"url": "https://certvde.com/en/advisories/VDE-2021-036"
},
{
"category": "self",
"summary": "VDE-2021-036: PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2021/vde-2021-036.json"
}
],
"title": "PHOENIX CONTACT: Products utilizing WIBU SYSTEMS CodeMeter components in versions prior to V7.21a",
"tracking": {
"aliases": [
"VDE-2021-036"
],
"current_release_date": "2025-05-14T12:28:19.000Z",
"generator": {
"date": "2025-01-29T11:23:03.562Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.17"
}
},
"id": "VDE-2021-036",
"initial_release_date": "2021-08-04T07:56:00.000Z",
"revision_history": [
{
"date": "2021-08-04T07:56:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2025-05-14T12:28:19.000Z",
"number": "2",
"summary": "Fix: version space, added distribution"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.4",
"product": {
"name": "Activation Wizard \u003c=1.4",
"product_id": "CSAFPID-51001"
}
}
],
"category": "product_name",
"name": "Activation Wizard"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.7.3",
"product": {
"name": "E-Mobility Charging Suite license codes for EV Charging Suite Setup \u003c=1.7.3",
"product_id": "CSAFPID-51002",
"product_identification_helper": {
"model_numbers": [
"1153509",
"1153513",
"1086929",
"1153516",
"1086891",
"1153508",
"1153520",
"1086921",
"1086889",
"1086920"
]
}
}
}
],
"category": "product_name",
"name": "E-Mobility Charging Suite license codes for EV Charging Suite Setup"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=5.0",
"product": {
"name": "FL Network Manager \u003c=5.0",
"product_id": "CSAFPID-51003",
"product_identification_helper": {
"model_numbers": [
"2702889"
]
}
}
}
],
"category": "product_name",
"name": "FL Network Manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.7.0",
"product": {
"name": "IOL-CONF \u003c=1.7.0",
"product_id": "CSAFPID-51004",
"product_identification_helper": {
"model_numbers": [
"1083065"
]
}
}
}
],
"category": "product_name",
"name": "IOL-CONF"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2021.06",
"product": {
"name": "PC Worx Engineer \u003c=2021.06",
"product_id": "CSAFPID-51005",
"product_identification_helper": {
"model_numbers": [
"1046008"
]
}
}
}
],
"category": "product_name",
"name": "PC Worx Engineer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=2021.06",
"product": {
"name": "PLCNEXT ENGINEER EDU LIC \u003c=2021.06",
"product_id": "CSAFPID-51006",
"product_identification_helper": {
"model_numbers": [
"1165889"
]
}
}
}
],
"category": "product_name",
"name": "PLCNEXT ENGINEER EDU LIC"
}
],
"category": "product_family",
"name": "Software"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20994",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "1. Use general security best practices to protect systems from local and network attacks like described in the application node AH EN INDUSTRIAL SECURITY external link.\n2. Run CodeMeter as client only and use localhost as binding for the CodeMeter communication. With binding to localhost an attack is no longer possible via remote network connection. The network server is disabled by default. If it is not possible to disable the network server, using a host-based firewall to restrict access to the CmLAN port can reduce the risk.\n3. The CmWAN server is disabled by default. Please check if CmWAN is enabled and disable the feature if it is not needed.\n4. Run the CmWAN server only behind a reverse proxy with user authentication to prevent attacks from unauthenticated users. The risk of an unauthenticated attacker can be further reduced by using a host-based firewall that only allows the reverse proxy to access the CmWAN port.",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
},
{
"category": "vendor_fix",
"details": "PHOENIX CONTACT strongly recommends affected Users to upgrade to Codemeter V7.21a, which fixes these vulnerabilities. Wibu-Systems has already published this update for CodeMeter on their homepage. Since this current version of CodeMeter V7.21a has not yet been incorporated into Phoenix Contact products, we strongly recommend to download and install the current CodeMeter version directly from the Wibu-Systems homepage.",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.1,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.1,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
}
],
"title": "CVE-2021-20994"
},
{
"cve": "CVE-2021-20993",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "description",
"text": "In multiple managed switches by WAGO in different versions the activated directory listing provides an attacker with the index of the resources located inside the directory.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51006"
]
},
"remediations": [
{
"category": "mitigation",
"details": "1. Use general security best practices to protect systems from local and network attacks like described in the application node AH EN INDUSTRIAL SECURITY external link.\n2. Run CodeMeter as client only and use localhost as binding for the CodeMeter communication. With binding to localhost an attack is no longer possible via remote network connection. The network server is disabled by default. If it is not possible to disable the network server, using a host-based firewall to restrict access to the CmLAN port can reduce the risk.\n3. The CmWAN server is disabled by default. Please check if CmWAN is enabled and disable the feature if it is not needed.\n4. Run the CmWAN server only behind a reverse proxy with user authentication to prevent attacks from unauthenticated users. The risk of an unauthenticated attacker can be further reduced by using a host-based firewall that only allows the reverse proxy to access the CmWAN port.",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
},
{
"category": "vendor_fix",
"details": "PHOENIX CONTACT strongly recommends affected Users to upgrade to Codemeter V7.21a, which fixes these vulnerabilities. Wibu-Systems has already published this update for CodeMeter on their homepage. Since this current version of CodeMeter V7.21a has not yet been incorporated into Phoenix Contact products, we strongly recommend to download and install the current CodeMeter version directly from the Wibu-Systems homepage.",
"product_ids": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-51001",
"CSAFPID-51002",
"CSAFPID-51003",
"CSAFPID-51004",
"CSAFPID-51005",
"CSAFPID-51006"
]
}
],
"title": "CVE-2021-20993"
}
]
}
VAR-202105-0529
Vulnerability from variot - Updated: 2024-08-14 13:54In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management. plural WAGO The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. WAGO is a 750-88x series programmable logic controller from WAGO. The device is a digital operation electronic system designed specifically for applications in an industrial environment.
WAGO has a cross-site scripting vulnerability. The vulnerability stems from the lack of correct verification of client data in WEB applications
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202105-0529",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "0852-0303",
"scope": "lte",
"trust": 1.0,
"vendor": "wago",
"version": "1.2.3.s0"
},
{
"model": "0852-1505",
"scope": "lte",
"trust": 1.0,
"vendor": "wago",
"version": "1.1.6.s0"
},
{
"model": "0852-1305\\/000-001",
"scope": "lte",
"trust": 1.0,
"vendor": "wago",
"version": "1.0.4.s0"
},
{
"model": "0852-1505\\/000-001",
"scope": "lte",
"trust": 1.0,
"vendor": "wago",
"version": "1.0.4.s0"
},
{
"model": "0852-1305",
"scope": "lte",
"trust": 1.0,
"vendor": "wago",
"version": "1.1.7.s0"
},
{
"model": "0852-1505",
"scope": null,
"trust": 0.8,
"vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "0852-1305/000-001",
"scope": null,
"trust": 0.8,
"vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "0852-0303",
"scope": null,
"trust": 0.8,
"vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "0852-1305",
"scope": null,
"trust": 0.8,
"vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "0852-1505/000-001",
"scope": null,
"trust": 0.8,
"vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e",
"version": null
},
{
"model": "wago",
"scope": null,
"trust": 0.6,
"vendor": "wago",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"cve": "CVE-2021-20994",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"exploitabilityScore": 8.6,
"id": "CVE-2021-20994",
"impactScore": 2.9,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2021-34728",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 2.8,
"id": "CVE-2021-20994",
"impactScore": 2.7,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "info@cert.vde.com",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.8,
"id": "CVE-2021-20994",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 6.1,
"baseSeverity": "Medium",
"confidentialityImpact": "Low",
"exploitabilityScore": null,
"id": "CVE-2021-20994",
"impactScore": null,
"integrityImpact": "Low",
"privilegesRequired": "None",
"scope": "Changed",
"trust": 0.8,
"userInteraction": "Required",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2021-20994",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "info@cert.vde.com",
"id": "CVE-2021-20994",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2021-20994",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2021-34728",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202105-824",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2021-20994",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management. plural WAGO The product contains a cross-site scripting vulnerability.Information may be obtained and information may be tampered with. WAGO is a 750-88x series programmable logic controller from WAGO. The device is a digital operation electronic system designed specifically for applications in an industrial environment. \n\r\n\r\nWAGO has a cross-site scripting vulnerability. The vulnerability stems from the lack of correct verification of client data in WEB applications",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-20994"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "VULMON",
"id": "CVE-2021-20994"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-20994",
"trust": 3.9
},
{
"db": "CERT@VDE",
"id": "VDE-2021-013",
"trust": 3.1
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2021-34728",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-20994",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"id": "VAR-202105-0529",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
}
],
"trust": 1.08804715
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
}
]
},
"last_update_date": "2024-08-14T13:54:04.506000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top\u00a0Page",
"trust": 0.8,
"url": "https://www.wago.com/us/"
},
{
"title": "Patch for WAGO Cross-Site Scripting Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/265081"
},
{
"title": "WAGO Fixes for cross-site scripting vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=151438"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-79",
"trust": 1.0
},
{
"problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20994"
},
{
"trust": 0.8,
"url": "https://cert.vde.com/en/advisories/vde-2021-013/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/79.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"date": "2021-05-13T00:00:00",
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"date": "2022-01-24T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"date": "2021-05-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"date": "2021-05-13T14:15:17.970000",
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-05-16T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"date": "2021-05-20T00:00:00",
"db": "VULMON",
"id": "CVE-2021-20994"
},
{
"date": "2022-01-24T06:24:00",
"db": "JVNDB",
"id": "JVNDB-2021-006863"
},
{
"date": "2021-05-21T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202105-824"
},
{
"date": "2021-05-20T20:06:30.033000",
"db": "NVD",
"id": "CVE-2021-20994"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "WAGO Cross-Site Scripting Vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-34728"
},
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
}
],
"trust": 1.2
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "XSS",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202105-824"
}
],
"trust": 0.6
}
}
GHSA-PVCX-JPFW-6GM6
Vulnerability from github – Published: 2022-05-24 19:02 – Updated: 2022-05-24 19:02In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
{
"affected": [],
"aliases": [
"CVE-2021-20994"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-05-13T14:15:00Z",
"severity": "MODERATE"
},
"details": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.",
"id": "GHSA-pvcx-jpfw-6gm6",
"modified": "2022-05-24T19:02:23Z",
"published": "2022-05-24T19:02:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20994"
},
{
"type": "WEB",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
],
"schema_version": "1.4.0",
"severity": []
}
CNVD-2021-34728
Vulnerability from cnvd - Published: 2021-05-16厂商已发布了漏洞修复程序,请及时关注更新: https://wago.io/
| Name | WAGO WAGO null |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-20994",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-20994"
}
},
"description": "WAGO\u662f\u5fb7\u56fd\u4e07\u53ef\uff08WAGO\uff09\u7684\u4e00\u6b3e750-88x\u7cfb\u5217\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\u8be5\u8bbe\u5907\u4e13\u95e8\u4e3a\u5728\u5de5\u4e1a\u73af\u5883\u4e0b\u5e94\u7528\u800c\u8bbe\u8ba1\u7684\u6570\u5b57\u8fd0\u7b97\u64cd\u4f5c\u7535\u5b50\u7cfb\u7edf\u3002\n\nWAGO\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u80fd\u8bf1\u9a97\u5408\u6cd5\u7528\u6237\u5355\u51fb\u94fe\u63a5\uff0c\u5c06\u6076\u610f\u4ee3\u7801\u6ce8\u5165Web\u670d\u52a1\u4e2d\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://wago.io/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-34728",
"openTime": "2021-05-16",
"patchDescription": "WAGO\u662f\u5fb7\u56fd\u4e07\u53ef\uff08WAGO\uff09\u7684\u4e00\u6b3e750-88x\u7cfb\u5217\u53ef\u7f16\u7a0b\u903b\u8f91\u63a7\u5236\u5668\u3002\u8be5\u8bbe\u5907\u4e13\u95e8\u4e3a\u5728\u5de5\u4e1a\u73af\u5883\u4e0b\u5e94\u7528\u800c\u8bbe\u8ba1\u7684\u6570\u5b57\u8fd0\u7b97\u64cd\u4f5c\u7535\u5b50\u7cfb\u7edf\u3002\r\n\r\nWAGO\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8be5\u6f0f\u6d1e\u6e90\u4e8eWEB\u5e94\u7528\u7f3a\u5c11\u5bf9\u5ba2\u6237\u7aef\u6570\u636e\u7684\u6b63\u786e\u9a8c\u8bc1\u3002\u653b\u51fb\u8005\u53ef\u80fd\u8bf1\u9a97\u5408\u6cd5\u7528\u6237\u5355\u51fb\u94fe\u63a5\uff0c\u5c06\u6076\u610f\u4ee3\u7801\u6ce8\u5165Web\u670d\u52a1\u4e2d\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "WAGO\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "WAGO WAGO null"
},
"referenceLink": "https://cert.vde.com/en-us/advisories/vde-2021-013",
"serverity": "\u9ad8",
"submitTime": "2021-05-14",
"title": "WAGO\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}
GSD-2021-20994
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-20994",
"description": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.",
"id": "GSD-2021-20994"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-20994"
],
"details": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.",
"id": "GSD-2021-20994",
"modified": "2023-12-13T01:23:11.963683Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-05-05T10:00:00.000Z",
"ID": "CVE-2021-20994",
"STATE": "PUBLIC",
"TITLE": "WAGO: Managed Switches: Reflected Cross-site Scripting"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "0852-0303",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.2.3.S0"
}
]
}
},
{
"product_name": "0852-1305",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.1.7.S0"
}
]
}
},
{
"product_name": "0852-1505",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.1.6.S0"
}
]
}
},
{
"product_name": "0852-1305/000-001",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.0.4.S0"
}
]
}
},
{
"product_name": "0852-1505/000-001",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_value": "V1.0.4.S0"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Dr. Tobias Augustin and Stephan Tigges of IKS \u2013 Institut f\u00fcr Kooperative Systeme GmbH, Kai Gaul and Jan R\u00fcbenach of ABO Wind AG, coordinated by CERT@VDE"
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-013",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
]
},
"solution": [
{
"lang": "eng",
"value": "The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities.\n\nRegardless of the action described above, the vulnerabilities are fixed with following firmware releases:\nItem number [FW version]\n0852-0303 (HW \u003c 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide.\n0852-0303 (HW \u003e=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide.\n0852-1305 [V1.1.8.S0]\n0852-1505 [V1.1.7.S0]\n0852-1305/000-001 [V1.1.4.S0]\n0852-1505/000-001 [V1.1.4.S0]"
}
],
"source": {
"advisory": "VDE-2021-013",
"defect": [
"VDE-2021-013"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "Disable the web server of the device.\nUse the CLI interface of the device.\nUpdate to the latest firmware.\nRestrict network access to the device.\nDo not directly connect the device to the internet."
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:wago:0852-0303_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.2.3.s0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:wago:0852-0303:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:wago:0852-1305_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.7.s0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:wago:0852-1305:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:wago:0852-1505_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.1.6.s0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:wago:0852-1505:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:wago:0852-1305\\/000-001_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.4.s0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:wago:0852-1305\\/000-001:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:wago:0852-1505\\/000-001_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.0.4.s0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:wago:0852-1505\\/000-001:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"ID": "CVE-2021-20994"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2021-013",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2021-013"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2021-05-20T20:06Z",
"publishedDate": "2021-05-13T14:15Z"
}
}
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.