VDE-2022-047
Vulnerability from csaf_wagogmbhcokg - Published: 2022-10-12 08:00 - Updated: 2022-10-12 08:00Summary
WAGO: FTP-Server - Denial-of-Service
Notes
Summary: The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.See also: Siemens Advisory published October 11th, 2022 - SSA-313313
Impact: Abusing this vulnerability an attacker can crash an affected product, which fully prevents the product to work as intended. After a complete restart the component works as expected.
Mitigation: If you enabled the FTP-Server, but you do not need FTP data transfer, you can deactivate the FTP Server over the product settings in the web-based management.
As general security measures strongly WAGO recommends:
1. Use general security best practices to protect systems from local and network attacks.
2. Do not allow direct access to the device from untrusted networks.
3. Update to the latest firmware according to the table in chapter solutions.
4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.
The BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf external link).
Remediation: Wago recommends all effected users to update to the firmware version listed below:
### Series WAGO 750-3x / -8x
| Article Number | Fixed Version |
|-----------------------|----------------------------------|
| 750-330 | Beta FW17 Q1/2023 |
| 750-332 | FW11 after BACnet certification |
| 750-352/xxx-xxx | FW17 Q1/2023 |
| 750-362/xxx-xxx | FW11 Q1/2023 |
| 750-363/xxx-xxx | FW11 Q1/2023 |
| 750-364/xxx-xxx | FW11 Q1/2023 |
| 750-365/xxx-xxx | FW11 Q1/2023 |
| 750-823 | FW11 Q1/2023 |
| 750-829 | Beta FW17 Q1/2023 |
| 750-831/xxx-xxx | Beta FW17 Q1/2023 |
| 750-832/xxx-xxx | FW11 after BACnet certification |
| 750-852 | FW17 Q1/2023 |
| 750-862 | FW11 Q1/2023 |
| 750-880/xxx-xxx | FW17 Q1/2023 |
| 750-881 | FW17 Q1/2023 |
| 750-882 | FW17 Q1/2023 |
| 750-885/xxx-xxx | FW17 Q1/2023 |
| 750-889 | FW17 Q1/2023 |
| 750-890/xxx-xxx | FW11 Q1/2023 |
| 750-891 | FW11 Q1/2023 |
| 750-893 | FW11 Q1/2023 |
A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions), Nucleus Source Code (Versions including affected FTP server). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.
7.5 (High)
Mitigation
If you enabled the FTP-Server, but you do not need FTP data transfer, you can deactivate the FTP Server over the product settings in the web-based management.
As general security measures strongly WAGO recommends:
1. Use general security best practices to protect systems from local and network attacks.
2. Do not allow direct access to the device from untrusted networks.
3. Update to the latest firmware according to the table in chapter solutions.
4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.
The BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf external link).
Vendor Fix
Wago recommends all effected users to update to the firmware version listed below:
### Series WAGO 750-3x / -8x
| Article Number | Fixed Version |
|-----------------------|----------------------------------|
| 750-330 | Beta FW17 Q1/2023 |
| 750-332 | FW11 after BACnet certification |
| 750-352/xxx-xxx | FW17 Q1/2023 |
| 750-362/xxx-xxx | FW11 Q1/2023 |
| 750-363/xxx-xxx | FW11 Q1/2023 |
| 750-364/xxx-xxx | FW11 Q1/2023 |
| 750-365/xxx-xxx | FW11 Q1/2023 |
| 750-823 | FW11 Q1/2023 |
| 750-829 | Beta FW17 Q1/2023 |
| 750-831/xxx-xxx | Beta FW17 Q1/2023 |
| 750-832/xxx-xxx | FW11 after BACnet certification |
| 750-852 | FW17 Q1/2023 |
| 750-862 | FW11 Q1/2023 |
| 750-880/xxx-xxx | FW17 Q1/2023 |
| 750-881 | FW17 Q1/2023 |
| 750-882 | FW17 Q1/2023 |
| 750-885/xxx-xxx | FW17 Q1/2023 |
| 750-889 | FW17 Q1/2023 |
| 750-890/xxx-xxx | FW11 Q1/2023 |
| 750-891 | FW11 Q1/2023 |
| 750-893 | FW11 Q1/2023 |
References
| URL | Category | |
|---|---|---|
Acknowledgments
CERT@VDE
certvde.com
Kaspersky
Roman Ezhov
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Roman Ezhov"
],
"organization": "Kaspersky",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.See also:\u00a0Siemens Advisory published October 11th, 2022 - SSA-313313",
"title": "Summary"
},
{
"category": "description",
"text": "Abusing this vulnerability an attacker can crash an affected product, which fully prevents the product to work as intended. After a complete restart the component works as expected.",
"title": "Impact"
},
{
"category": "description",
"text": "If you enabled the FTP-Server, but you do not need FTP data transfer, you can deactivate the FTP Server over the product settings in the web-based management.\n\nAs general security measures strongly WAGO recommends:\n\n1. Use general security best practices to protect systems from local and network attacks.\n\n2. Do not allow direct access to the device from untrusted networks.\n\n3. Update to the latest firmware according to the table in chapter solutions.\n\n4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.\nThe BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf external link).",
"title": "Mitigation"
},
{
"category": "description",
"text": "Wago recommends all effected users to update to the firmware version listed below:\n\n### Series WAGO 750-3x / -8x\n\n| Article Number | Fixed Version |\n|-----------------------|----------------------------------|\n| 750-330 | Beta FW17 Q1/2023 |\n| 750-332 | FW11 after BACnet certification |\n| 750-352/xxx-xxx | FW17 Q1/2023 |\n| 750-362/xxx-xxx | FW11 Q1/2023 |\n| 750-363/xxx-xxx | FW11 Q1/2023 |\n| 750-364/xxx-xxx | FW11 Q1/2023 |\n| 750-365/xxx-xxx | FW11 Q1/2023 |\n| 750-823 | FW11 Q1/2023 |\n| 750-829 | Beta FW17 Q1/2023 |\n| 750-831/xxx-xxx | Beta FW17 Q1/2023 |\n| 750-832/xxx-xxx | FW11 after BACnet certification |\n| 750-852 | FW17 Q1/2023 |\n| 750-862 | FW11 Q1/2023 |\n| 750-880/xxx-xxx | FW17 Q1/2023 |\n| 750-881 | FW17 Q1/2023 |\n| 750-882 | FW17 Q1/2023 |\n| 750-885/xxx-xxx | FW17 Q1/2023 |\n| 750-889 | FW17 Q1/2023 |\n| 750-890/xxx-xxx | FW11 Q1/2023 |\n| 750-891 | FW11 Q1/2023 |\n| 750-893 | FW11 Q1/2023 |",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "self",
"summary": "VDE-2022-047: WAGO: FTP-Server - Denial-of-Service - HTML",
"url": "https://certvde.com/en/advisories/VDE-2022-047/"
},
{
"category": "self",
"summary": "VDE-2022-047: WAGO: FTP-Server - Denial-of-Service - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2022/vde-2022-047.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.wago.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for WAGO GmbH \u0026 Co. KG",
"url": "https://certvde.com/en/advisories/vendor/wago/"
}
],
"title": "WAGO: FTP-Server - Denial-of-Service",
"tracking": {
"aliases": [
"VDE-2022-047"
],
"current_release_date": "2022-10-12T08:00:00.000Z",
"generator": {
"date": "2025-04-30T08:57:32.237Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.24"
}
},
"id": "VDE-2022-047",
"initial_release_date": "2022-10-12T08:00:00.000Z",
"revision_history": [
{
"date": "2022-10-12T08:00:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "750-330",
"product": {
"name": "750-330",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"750-330"
]
}
}
},
{
"category": "product_name",
"name": "750-332",
"product": {
"name": "750-332",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"750-332"
]
}
}
},
{
"category": "product_name",
"name": "750-352/xxx-xxx",
"product": {
"name": "750-352/xxx-xxx",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"750-352/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-362/xxx-xxx",
"product": {
"name": "750-362/xxx-xxx",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"750-362/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-363/xxx-xxx",
"product": {
"name": "750-363/xxx-xxx",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"750-363/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-364/xxx-xxx",
"product": {
"name": "750-364/xxx-xxx",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"model_numbers": [
"750-364/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-365/xxx-xxx",
"product": {
"name": "750-365/xxx-xxx",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"model_numbers": [
"750-365/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-823",
"product": {
"name": "750-823",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"model_numbers": [
"750-823"
]
}
}
},
{
"category": "product_name",
"name": "750-829",
"product": {
"name": "750-829",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"model_numbers": [
"750-829"
]
}
}
},
{
"category": "product_name",
"name": "750-831/xxx-xxx",
"product": {
"name": "750-831/xxx-xxx",
"product_id": "CSAFPID-11010",
"product_identification_helper": {
"model_numbers": [
"750-831/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-832/xxx-xxx",
"product": {
"name": "750-832/xxx-xxx",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"model_numbers": [
"750-832/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-852",
"product": {
"name": "750-852",
"product_id": "CSAFPID-11012",
"product_identification_helper": {
"model_numbers": [
"750-852"
]
}
}
},
{
"category": "product_name",
"name": "750-862",
"product": {
"name": "750-862",
"product_id": "CSAFPID-11013",
"product_identification_helper": {
"model_numbers": [
"750-862"
]
}
}
},
{
"category": "product_name",
"name": "750-880/xxx-xxx",
"product": {
"name": "750-880/xxx-xxx",
"product_id": "CSAFPID-11014",
"product_identification_helper": {
"model_numbers": [
"750-880/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-881",
"product": {
"name": "750-881",
"product_id": "CSAFPID-11015",
"product_identification_helper": {
"model_numbers": [
"750-881"
]
}
}
},
{
"category": "product_name",
"name": "750-882",
"product": {
"name": "750-882",
"product_id": "CSAFPID-11016",
"product_identification_helper": {
"model_numbers": [
"750-882"
]
}
}
},
{
"category": "product_name",
"name": "750-885/xxx-xxx",
"product": {
"name": "750-885/xxx-xxx",
"product_id": "CSAFPID-11017",
"product_identification_helper": {
"model_numbers": [
"750-885/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-889",
"product": {
"name": "750-889",
"product_id": "CSAFPID-11018",
"product_identification_helper": {
"model_numbers": [
"750-889"
]
}
}
},
{
"category": "product_name",
"name": "750-890/xxx-xxx",
"product": {
"name": "750-890/xxx-xxx",
"product_id": "CSAFPID-11019",
"product_identification_helper": {
"model_numbers": [
"750-890/xxx-xxx"
]
}
}
},
{
"category": "product_name",
"name": "750-891",
"product": {
"name": "750-891",
"product_id": "CSAFPID-11020",
"product_identification_helper": {
"model_numbers": [
"750-891"
]
}
}
},
{
"category": "product_name",
"name": "750-893",
"product": {
"name": "750-893",
"product_id": "CSAFPID-11021",
"product_identification_helper": {
"model_numbers": [
"750-893"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=FW13",
"product": {
"name": "Firmware \u003c=FW13",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c=FW10",
"product": {
"name": "Firmware \u003c=FW10",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version_range",
"name": "\u003c=FW14",
"product": {
"name": "Firmware \u003c=FW14",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version_range",
"name": "\u003c=FW16",
"product": {
"name": "Firmware \u003c=FW16",
"product_id": "CSAFPID-21004"
}
},
{
"category": "product_version",
"name": "FW17",
"product": {
"name": "Firmware FW17",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "FW11",
"product": {
"name": "Firmware FW11",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "WAGO"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW13 installed on 750-330",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-332",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW14 installed on 750-352/xxx-xxx",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-362/xxx-xxx",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-363/xxx-xxx",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-364/xxx-xxx",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-365/xxx-xxx",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-823",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW13 installed on 750-829",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW13 installed on 750-831/xxx-xxx",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-832/xxx-xxx",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-852",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-862",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-880/xxx-xxx",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-881",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-882",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-885/xxx-xxx",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW16 installed on 750-889",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-890/xxx-xxx",
"product_id": "CSAFPID-31019"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-891",
"product_id": "CSAFPID-31020"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=FW10 installed on 750-893",
"product_id": "CSAFPID-31021"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-330",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-332",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-352/xxx-xxx",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-362/xxx-xxx",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-363/xxx-xxx",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-364/xxx-xxx",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-365/xxx-xxx",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-823",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-829",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-831/xxx-xxx",
"product_id": "CSAFPID-32010"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-832/xxx-xxx",
"product_id": "CSAFPID-32011"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-852",
"product_id": "CSAFPID-32012"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-862",
"product_id": "CSAFPID-32013"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-880/xxx-xxx",
"product_id": "CSAFPID-32014"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-881",
"product_id": "CSAFPID-32015"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-882",
"product_id": "CSAFPID-32016"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-885/xxx-xxx",
"product_id": "CSAFPID-32017"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW17 installed on 750-889",
"product_id": "CSAFPID-32018"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-890/xxx-xxx",
"product_id": "CSAFPID-32019"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-891",
"product_id": "CSAFPID-32020"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware FW11 installed on 750-893",
"product_id": "CSAFPID-32021"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11021"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-38371",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions), Nucleus Source Code (Versions including affected FTP server). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If you enabled the FTP-Server, but you do not need FTP data transfer, you can deactivate the FTP Server over the product settings in the web-based management.\n\nAs general security measures strongly WAGO recommends:\n\n1. Use general security best practices to protect systems from local and network attacks.\n\n2. Do not allow direct access to the device from untrusted networks.\n\n3. Update to the latest firmware according to the table in chapter solutions.\n\n4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.\nThe BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf external link).",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Wago recommends all effected users to update to the firmware version listed below:\n\n### Series WAGO 750-3x / -8x\n\n| Article Number | Fixed Version |\n|-----------------------|----------------------------------|\n| 750-330 | Beta FW17 Q1/2023 |\n| 750-332 | FW11 after BACnet certification |\n| 750-352/xxx-xxx | FW17 Q1/2023 |\n| 750-362/xxx-xxx | FW11 Q1/2023 |\n| 750-363/xxx-xxx | FW11 Q1/2023 |\n| 750-364/xxx-xxx | FW11 Q1/2023 |\n| 750-365/xxx-xxx | FW11 Q1/2023 |\n| 750-823 | FW11 Q1/2023 |\n| 750-829 | Beta FW17 Q1/2023 |\n| 750-831/xxx-xxx | Beta FW17 Q1/2023 |\n| 750-832/xxx-xxx | FW11 after BACnet certification |\n| 750-852 | FW17 Q1/2023 |\n| 750-862 | FW11 Q1/2023 |\n| 750-880/xxx-xxx | FW17 Q1/2023 |\n| 750-881 | FW17 Q1/2023 |\n| 750-882 | FW17 Q1/2023 |\n| 750-885/xxx-xxx | FW17 Q1/2023 |\n| 750-889 | FW17 Q1/2023 |\n| 750-890/xxx-xxx | FW11 Q1/2023 |\n| 750-891 | FW11 Q1/2023 |\n| 750-893 | FW11 Q1/2023 |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021"
]
}
],
"title": "CVE-2022-38371"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…