Search criteria
72 vulnerabilities found for 750-891_firmware by wago
FKIE_CVE-2023-1620
Vulnerability from fkie_nvd - Published: 2023-06-26 07:15 - Updated: 2024-11-21 07:39
Severity ?
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
4.9 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-006/ | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-006/ | Mitigation, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-331_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6E0849-BB68-41FD-8A8F-0D1C2706CAEC",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-331:-:*:*:*:*:*:*:*",
"matchCriteriaId": "907712D2-72A3-46EB-9438-B35A2880E7BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "551C0E63-CF9E-444C-AE0C-100A97ECC9B1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4284AF6B-DAA7-49FF-AA76-D7E7DFDFE07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47549C97-D522-4AD7-BD23-9D2F3C72132E",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "397706F7-F98A-4121-9FBA-DD1535E6E404",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B47DFA-BEAB-45F1-A590-14F229E8DF04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D714E6B-11E5-4B0F-82C1-23E5118C56D1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "F942D64E-3EB4-4D31-813D-0B59F79A7720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C62B2C95-B80C-4078-A303-55055D915424",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "96DA2FAA-022A-4B40-A465-C5F812B946E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1101B5D8-D3AA-4942-A0CB-FD310F70C775",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FC3F904C-D7B5-44C9-A911-13820A1BC69B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC647C3-A602-412F-A4DA-5ED092E2779C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89CF4D3F-91EE-4868-BD4B-2FDB6F8D9498",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3FEFA258-B6DA-4503-BE34-54554063D3B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B99800-C5E6-4001-BCBA-2DB5E3CF7D8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B800FD6-2D36-454F-80CF-AECED093BBDA",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-002_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "6DAB7507-A773-4C8B-A1C8-DB1F861A3143",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF4C2B9-4C44-4F83-B0D5-220A1525D254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAE570A8-B25C-433A-8046-BE71FC57BDCB",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "48FC9087-237B-4F9F-BC53-01322015012B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "977A1B79-8D15-49D8-8C58-F7B1FFDF0E8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9805EF8-11F5-40BF-8F0E-616E0FD11B11",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "159DAB8C-820E-4559-B56A-23E50FD30D24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4E35ACF-6C0A-4C9F-83A8-6CBAF927BE43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "145EA515-9E1D-40AA-BA23-555356477CDD",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "7852260B-66A5-494F-BE4E-6A01DE311F17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59E9F43D-7933-4212-9518-7C6BF289ED12",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8203\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "ED9A618C-BFEF-4A95-8E8C-FCB781900A83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E35209-C3F2-4251-9CB5-094FA9B0D076",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C9543F-3013-46F6-A7C0-618EE8EC6754",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "60DFC0BC-2EA6-49C8-9AC6-4406C6CA0EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "037047A8-7B3B-48A2-8B65-84C6C502D59C",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8204\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FAA7FFE7-69D8-44E2-A9DA-297B713AF666",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B3E682-F1FD-4ADD-B1B8-89D7BA93B3FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFE1CFA-E10A-4BBC-8A6A-6C08D4AC43D8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "13EEE4AE-0D12-4096-A0D1-8215A25FC2D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5AB00E-1770-46FC-A36D-36D883087AA0",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "8D54BB0C-B81E-4C76-9047-49D8F50CFB98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6196935C-97E0-40A2-AF06-03CB72E40B0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B15148A7-84AA-4A3E-8848-D881A5398CC7",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "78ABEF5A-B2DD-4702-8DA2-5944D7A40891",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2892D5-A691-48A9-ACC9-236A50E6A40E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0131DC36-2979-4B4D-B2D1-57C53C409FB3",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "EEFF4CAF-9D93-483E-82B6-D3B6F591AFAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49A39AFE-BC17-4A09-ABCE-271C2BB9AA07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD59B67-49A3-4A01-A714-C5E0BE076242",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "85A051E1-616B-4E3F-8F53-5B2A5AB1528F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B851D224-DFC0-4D96-AE88-0B7AF75FBCD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A003635E-1ED0-486A-BC9F-DA52B8A950D8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "B34A1422-48B2-4471-9DAF-AF9D3B71892C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7399A811-0861-4A43-90A6-013CEB77081D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "2C03CCC8-6645-454E-A9D1-E7ABDCBE5CD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F56DA20-D82B-48C7-B4AD-8534367E8D83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "854DDAAE-F8E0-4A65-AF7C-314FFCAC25DC",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3254AF58-A730-4300-8981-F2228A0AAD29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5C4BAD-7268-4367-A112-60E1A2EF6AF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34480DD4-C1AA-4B62-A7B5-FB54D985E86E",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "AC9A829B-22F4-4885-AF1D-00F683C559EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D92116-99B7-438D-B1EE-0F168C74F7A2",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "45BB3361-53C4-4F90-964A-7665C5897CAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFE4FF4-4EE4-493F-A8CF-968215142EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6ADD951D-6F50-48A8-88EF-F607703CA25A",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "16246BD0-7D69-44D5-BFF0-1F204BB44B22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B32F6244-FB19-4629-BCAB-A544C031E4BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D02C139-E2A7-4213-A1EF-582220F614EC",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "929C02C9-5772-4B2D-A665-CE748CF7A526",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC94CF-1060-4949-94B6-E34650419E3D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "53A03E53-F39D-4F12-A79A-D6DF8F8CD403",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7C8131-3BE2-4515-81F0-1C7644B622B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AED674D-16EC-4E8E-97BA-CB39B0019D60",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "95E73EC7-08A5-420C-8E18-22FE18440EC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50421963-086D-4B34-BCDA-1EA971708B73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A154FD7-45ED-4B3D-A445-E31FFC8C1C08",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "690B3B52-9119-469F-9DFB-CF4D787BC540",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E85C90EB-9603-4C3E-BEFC-B4C387214305",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "C06578AE-D8EC-4EA5-A2EA-7EDA7F967186",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4921C3E3-0ED0-4ECB-B791-BE3AE48D6F92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "482B61FF-6456-446D-88B6-ED5058995C43",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "C228D9F9-D78B-428F-875E-D1E99C7D76BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E6D37B-E7CF-401E-86F0-0E17694CF3C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C88AE5A-9B49-4E0E-B0BB-EE904DB7DAFA",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CBE28488-099B-414B-8778-A1B6EBB3D609",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C45DC9B-3AE4-4D63-ACD4-CA4EAA47F3D9",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "F39F0363-0C7F-4ACC-A90E-4A751A3A5A5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/000-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F356952-B865-49D8-889C-0A696E754C96",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A996843E-1CA8-40ED-9A55-0EEC8FB60C4F",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CDB27987-1EA0-48EA-AFF1-BCC31D14752F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31B9A7B1-2457-44E7-9753-DC5828281892",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2D7529-BA14-41AF-992A-4472A0A205F8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "44E48D9C-56FB-4212-9A46-42CF64946DAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC1F538-875D-4337-A42E-A837173B30FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "718C1B8C-A4A1-4119-8060-1E2D6EE51FF8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "52F43D9D-D8DA-4AA5-992F-A5D4627D34C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A81CC3BB-60A3-451F-BC34-F1D03517B0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680FF2B0-B05A-4D5D-B101-1E6D593D6098",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CCE148ED-96A8-4ED3-A324-97CA995C5D8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26478046-3D53-45DB-B5B9-EE160383C9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2ECEBF-4B8B-4DC8-B770-4E383D87F1EE",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FF25820F-B641-4442-9886-61E81DD8B96D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F94E5197-2913-488F-8E9C-AA14A4976726",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "321053FC-764E-4173-ACA6-E8EA9B87C578",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "B700EE5E-EFEF-4F55-AD40-1DD6B4CE8924",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF110184-7737-417A-8C9C-2F30FA8091C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "691C2432-2CAB-4E7F-917E-89CE7B030B03",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CBD60215-E245-4D59-BE3F-C775A815CBD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B60744FF-419F-42B4-8967-E110454B21A1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4F8EBA7B-A9E0-4800-AB8E-9E2D4AE6947A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "764647F1-F01F-42CD-94B6-D46494BDC1A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48797000-3235-4411-972F-0D1985F74010",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3DF9F583-33AD-43EF-904B-386AB358BC11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8215_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "051EDF25-11BE-450F-9277-B88470DBFF9B",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8215_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "47B06BC7-C2DA-4154-90F3-1D623AC8B63E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577EDC26-671C-4703-BBF0-FE93AFEA81E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C17D1808-B2DF-4BA1-8B12-46F8C0A051F2",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "D55A6726-A0FB-4A28-9C39-AA42715820C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6361C48B-DAF1-4AA7-B572-4B3D5CEB4BEF",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "31650753-ECA0-45A9-8FEE-379FE198588A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD81900-6337-4EB9-ABA5-836452AF3E59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D85C0BB-B674-4756-A4E5-0916A288B7CE",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "25D494F5-4FA3-4357-AD1B-42E0552EE318",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ED9EED-726C-4217-ABFE-CE0DE8BB902E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC097A3-1733-4DBE-BD0F-DB48C7E27529",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "9D23830F-CE66-41CF-83A9-52B61FC7829A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A56C1204-6939-4353-A917-5B3542A889D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08A03CC3-7F9F-4999-9B2F-CD715F0C5400",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "D6C1B459-1A96-4F2E-A312-09EB11870821",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FDB71B-0965-4F15-891B-D68F1092DEB8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "083644B6-48A8-4416-8AB9-A793E0D4AE34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6494874B-DB89-4C9C-BF6E-EB775D19C6B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C0FD6B-5C2F-484D-95DD-002F79C3412D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4C265A55-1C7C-40A0-AFD4-33335C978282",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/600-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D733746C-0F1D-49CB-BB1A-E8409E891389",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9119CD-296C-4AFF-9DD9-6BD99CE09BE7",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "5EA104B2-B823-4F0A-ACB2-AEF653928ACB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/625-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4228ED9E-36C8-4F01-9447-D1D58C3BD6C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00E7270D-BA8B-482E-B15B-5F92F8646CB8",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF93A1D-6A78-4EC5-8FEA-58FEFC6EEDB0",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB5953A-51A5-4A60-A066-4280066B968B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324FC413-AC5B-41A7-891A-F1A804F8C25E",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "291B13B5-3895-4F06-9CB9-C81BBE4961C2",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21D094-AE7C-4501-83F1-0884CB549F3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4410A1-EF14-47A1-91BB-30AD9340E38C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83807E05-5C45-49BB-A712-8440EA9E6864",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F43C2B-AA5E-4C09-9459-05273061CCB0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2168C616-BEA8-4FB9-AEA6-820E6537BEFA",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BF7980-8B31-45AF-869D-531801B98BFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06CCB3D-82AB-4D3E-B2BC-A8B0DA56A1F9",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C30C82-1A6F-42F3-92CA-D1F0BD6DB628",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B49CCB0C-FAD4-439D-94D9-2AB49DFA6F59",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC027AEF-12BD-45CF-969B-9336F57E104E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "051FDB96-489B-4CE3-96D0-0A829520B90E",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C8BE76-DE3D-41D0-9430-FB40AF02B1E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7519056-04A3-4E7A-AF71-BF459E0E6141",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F67429CE-3C16-4EB8-8373-F963947FCB17",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B4137-C73C-47D0-8489-CA0EF41ED9A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D88C6F15-0379-47C4-ADB4-9CB7661AD044",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2C91AA-9BD8-4856-B9AB-8E6CEAF8C8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C70D5A-7780-40B4-B3A9-79964324E32C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EB6B55-D27F-4939-832A-A391F6A3E89A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26E6806C-0EEF-4772-A64D-1C2124518991",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7862FE67-A0D9-4E4D-B7BD-EB70CF0260A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5778A709-DBFB-450A-B333-A58F69461A00",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94C15A80-4AB7-46A8-8ADC-A57A07F4CFA4",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
}
],
"id": "CVE-2023-1620",
"lastModified": "2024-11-21T07:39:33.570",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-26T07:15:09.197",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1288"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-1619
Vulnerability from fkie_nvd - Published: 2023-06-26 07:15 - Updated: 2024-11-21 07:39
Severity ?
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-006/ | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-006/ | Mitigation, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-331_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F6E0849-BB68-41FD-8A8F-0D1C2706CAEC",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-331:-:*:*:*:*:*:*:*",
"matchCriteriaId": "907712D2-72A3-46EB-9438-B35A2880E7BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "551C0E63-CF9E-444C-AE0C-100A97ECC9B1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4284AF6B-DAA7-49FF-AA76-D7E7DFDFE07B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47549C97-D522-4AD7-BD23-9D2F3C72132E",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "397706F7-F98A-4121-9FBA-DD1535E6E404",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B47DFA-BEAB-45F1-A590-14F229E8DF04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8D714E6B-11E5-4B0F-82C1-23E5118C56D1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "F942D64E-3EB4-4D31-813D-0B59F79A7720",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C62B2C95-B80C-4078-A303-55055D915424",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "96DA2FAA-022A-4B40-A465-C5F812B946E0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1101B5D8-D3AA-4942-A0CB-FD310F70C775",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FC3F904C-D7B5-44C9-A911-13820A1BC69B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC647C3-A602-412F-A4DA-5ED092E2779C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89CF4D3F-91EE-4868-BD4B-2FDB6F8D9498",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3FEFA258-B6DA-4503-BE34-54554063D3B4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B99800-C5E6-4001-BCBA-2DB5E3CF7D8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B800FD6-2D36-454F-80CF-AECED093BBDA",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-002_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "6DAB7507-A773-4C8B-A1C8-DB1F861A3143",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF4C2B9-4C44-4F83-B0D5-220A1525D254",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CAE570A8-B25C-433A-8046-BE71FC57BDCB",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "48FC9087-237B-4F9F-BC53-01322015012B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "977A1B79-8D15-49D8-8C58-F7B1FFDF0E8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9805EF8-11F5-40BF-8F0E-616E0FD11B11",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "159DAB8C-820E-4559-B56A-23E50FD30D24",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D4E35ACF-6C0A-4C9F-83A8-6CBAF927BE43",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "145EA515-9E1D-40AA-BA23-555356477CDD",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "7852260B-66A5-494F-BE4E-6A01DE311F17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59E9F43D-7933-4212-9518-7C6BF289ED12",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8203\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "ED9A618C-BFEF-4A95-8E8C-FCB781900A83",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E35209-C3F2-4251-9CB5-094FA9B0D076",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C9543F-3013-46F6-A7C0-618EE8EC6754",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "60DFC0BC-2EA6-49C8-9AC6-4406C6CA0EE3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "037047A8-7B3B-48A2-8B65-84C6C502D59C",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8204\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FAA7FFE7-69D8-44E2-A9DA-297B713AF666",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40B3E682-F1FD-4ADD-B1B8-89D7BA93B3FD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4CFE1CFA-E10A-4BBC-8A6A-6C08D4AC43D8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "13EEE4AE-0D12-4096-A0D1-8215A25FC2D6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5AB00E-1770-46FC-A36D-36D883087AA0",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "8D54BB0C-B81E-4C76-9047-49D8F50CFB98",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6196935C-97E0-40A2-AF06-03CB72E40B0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B15148A7-84AA-4A3E-8848-D881A5398CC7",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "78ABEF5A-B2DD-4702-8DA2-5944D7A40891",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2892D5-A691-48A9-ACC9-236A50E6A40E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0131DC36-2979-4B4D-B2D1-57C53C409FB3",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "EEFF4CAF-9D93-483E-82B6-D3B6F591AFAC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49A39AFE-BC17-4A09-ABCE-271C2BB9AA07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD59B67-49A3-4A01-A714-C5E0BE076242",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "85A051E1-616B-4E3F-8F53-5B2A5AB1528F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B851D224-DFC0-4D96-AE88-0B7AF75FBCD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A003635E-1ED0-486A-BC9F-DA52B8A950D8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "B34A1422-48B2-4471-9DAF-AF9D3B71892C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7399A811-0861-4A43-90A6-013CEB77081D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "2C03CCC8-6645-454E-A9D1-E7ABDCBE5CD6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F56DA20-D82B-48C7-B4AD-8534367E8D83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "854DDAAE-F8E0-4A65-AF7C-314FFCAC25DC",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3254AF58-A730-4300-8981-F2228A0AAD29",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5C4BAD-7268-4367-A112-60E1A2EF6AF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34480DD4-C1AA-4B62-A7B5-FB54D985E86E",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "AC9A829B-22F4-4885-AF1D-00F683C559EA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D92116-99B7-438D-B1EE-0F168C74F7A2",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "45BB3361-53C4-4F90-964A-7665C5897CAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFE4FF4-4EE4-493F-A8CF-968215142EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6ADD951D-6F50-48A8-88EF-F607703CA25A",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "16246BD0-7D69-44D5-BFF0-1F204BB44B22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B32F6244-FB19-4629-BCAB-A544C031E4BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D02C139-E2A7-4213-A1EF-582220F614EC",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "929C02C9-5772-4B2D-A665-CE748CF7A526",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46EC94CF-1060-4949-94B6-E34650419E3D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "53A03E53-F39D-4F12-A79A-D6DF8F8CD403",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7C8131-3BE2-4515-81F0-1C7644B622B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AED674D-16EC-4E8E-97BA-CB39B0019D60",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "95E73EC7-08A5-420C-8E18-22FE18440EC7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50421963-086D-4B34-BCDA-1EA971708B73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A154FD7-45ED-4B3D-A445-E31FFC8C1C08",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "690B3B52-9119-469F-9DFB-CF4D787BC540",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E85C90EB-9603-4C3E-BEFC-B4C387214305",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "C06578AE-D8EC-4EA5-A2EA-7EDA7F967186",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4921C3E3-0ED0-4ECB-B791-BE3AE48D6F92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "482B61FF-6456-446D-88B6-ED5058995C43",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "C228D9F9-D78B-428F-875E-D1E99C7D76BA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E6D37B-E7CF-401E-86F0-0E17694CF3C3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C88AE5A-9B49-4E0E-B0BB-EE904DB7DAFA",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CBE28488-099B-414B-8778-A1B6EBB3D609",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8C45DC9B-3AE4-4D63-ACD4-CA4EAA47F3D9",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "F39F0363-0C7F-4ACC-A90E-4A751A3A5A5E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/000-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F356952-B865-49D8-889C-0A696E754C96",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A996843E-1CA8-40ED-9A55-0EEC8FB60C4F",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CDB27987-1EA0-48EA-AFF1-BCC31D14752F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31B9A7B1-2457-44E7-9753-DC5828281892",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB2D7529-BA14-41AF-992A-4472A0A205F8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "44E48D9C-56FB-4212-9A46-42CF64946DAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC1F538-875D-4337-A42E-A837173B30FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "718C1B8C-A4A1-4119-8060-1E2D6EE51FF8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "52F43D9D-D8DA-4AA5-992F-A5D4627D34C1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A81CC3BB-60A3-451F-BC34-F1D03517B0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680FF2B0-B05A-4D5D-B101-1E6D593D6098",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CCE148ED-96A8-4ED3-A324-97CA995C5D8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26478046-3D53-45DB-B5B9-EE160383C9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2ECEBF-4B8B-4DC8-B770-4E383D87F1EE",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "FF25820F-B641-4442-9886-61E81DD8B96D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F94E5197-2913-488F-8E9C-AA14A4976726",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "321053FC-764E-4173-ACA6-E8EA9B87C578",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "B700EE5E-EFEF-4F55-AD40-1DD6B4CE8924",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF110184-7737-417A-8C9C-2F30FA8091C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "691C2432-2CAB-4E7F-917E-89CE7B030B03",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "CBD60215-E245-4D59-BE3F-C775A815CBD9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B60744FF-419F-42B4-8967-E110454B21A1",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4F8EBA7B-A9E0-4800-AB8E-9E2D4AE6947A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "764647F1-F01F-42CD-94B6-D46494BDC1A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48797000-3235-4411-972F-0D1985F74010",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "3DF9F583-33AD-43EF-904B-386AB358BC11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8215_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "051EDF25-11BE-450F-9277-B88470DBFF9B",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8215_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "47B06BC7-C2DA-4154-90F3-1D623AC8B63E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577EDC26-671C-4703-BBF0-FE93AFEA81E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C17D1808-B2DF-4BA1-8B12-46F8C0A051F2",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "D55A6726-A0FB-4A28-9C39-AA42715820C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6361C48B-DAF1-4AA7-B572-4B3D5CEB4BEF",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "31650753-ECA0-45A9-8FEE-379FE198588A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD81900-6337-4EB9-ABA5-836452AF3E59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6D85C0BB-B674-4756-A4E5-0916A288B7CE",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "25D494F5-4FA3-4357-AD1B-42E0552EE318",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ED9EED-726C-4217-ABFE-CE0DE8BB902E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC097A3-1733-4DBE-BD0F-DB48C7E27529",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "9D23830F-CE66-41CF-83A9-52B61FC7829A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A56C1204-6939-4353-A917-5B3542A889D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08A03CC3-7F9F-4999-9B2F-CD715F0C5400",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "D6C1B459-1A96-4F2E-A312-09EB11870821",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2FDB71B-0965-4F15-891B-D68F1092DEB8",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "083644B6-48A8-4416-8AB9-A793E0D4AE34",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6494874B-DB89-4C9C-BF6E-EB775D19C6B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D3C0FD6B-5C2F-484D-95DD-002F79C3412D",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "4C265A55-1C7C-40A0-AFD4-33335C978282",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/600-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D733746C-0F1D-49CB-BB1A-E8409E891389",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F9119CD-296C-4AFF-9DD9-6BD99CE09BE7",
"versionEndExcluding": "fw22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:fw22:-:*:*:*:*:*:*",
"matchCriteriaId": "5EA104B2-B823-4F0A-ACB2-AEF653928ACB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/625-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4228ED9E-36C8-4F01-9447-D1D58C3BD6C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00E7270D-BA8B-482E-B15B-5F92F8646CB8",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6FF93A1D-6A78-4EC5-8FEA-58FEFC6EEDB0",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB5953A-51A5-4A60-A066-4280066B968B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324FC413-AC5B-41A7-891A-F1A804F8C25E",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "291B13B5-3895-4F06-9CB9-C81BBE4961C2",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21D094-AE7C-4501-83F1-0884CB549F3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4410A1-EF14-47A1-91BB-30AD9340E38C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "83807E05-5C45-49BB-A712-8440EA9E6864",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B2F43C2B-AA5E-4C09-9459-05273061CCB0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2168C616-BEA8-4FB9-AEA6-820E6537BEFA",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E5BF7980-8B31-45AF-869D-531801B98BFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D06CCB3D-82AB-4D3E-B2BC-A8B0DA56A1F9",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E1C30C82-1A6F-42F3-92CA-D1F0BD6DB628",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B49CCB0C-FAD4-439D-94D9-2AB49DFA6F59",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FC027AEF-12BD-45CF-969B-9336F57E104E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "051FDB96-489B-4CE3-96D0-0A829520B90E",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C8BE76-DE3D-41D0-9430-FB40AF02B1E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7519056-04A3-4E7A-AF71-BF459E0E6141",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F67429CE-3C16-4EB8-8373-F963947FCB17",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B4137-C73C-47D0-8489-CA0EF41ED9A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D88C6F15-0379-47C4-ADB4-9CB7661AD044",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2C91AA-9BD8-4856-B9AB-8E6CEAF8C8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C70D5A-7780-40B4-B3A9-79964324E32C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EB6B55-D27F-4939-832A-A391F6A3E89A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26E6806C-0EEF-4772-A64D-1C2124518991",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7862FE67-A0D9-4E4D-B7BD-EB70CF0260A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5778A709-DBFB-450A-B333-A58F69461A00",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94C15A80-4AB7-46A8-8ADC-A57A07F4CFA4",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
}
],
"id": "CVE-2023-1619",
"lastModified": "2024-11-21T07:39:33.333",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-06-26T07:15:09.090",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1288"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2023-1150
Vulnerability from fkie_nvd - Published: 2023-06-26 07:15 - Updated: 2024-11-21 07:38
Severity ?
Summary
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-005/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-005/ | Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-363\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9A35B342-9D43-4D79-A350-0881F77E85F1",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-363\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A2ACE30-6FC4-4AAE-8EEF-D8F3C3CE814F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-362\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B010D10D-608D-499F-B5E7-5D768EA95242",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-362\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05A3A21A-1E9D-458E-9385-93DD645AA04B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-362\\/000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1FAC91DD-6F37-441C-BA36-AD969ABAD4C0",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-362\\/000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "18F9CAA7-5ED8-4ACE-BBF9-0453C1BABDA4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5778A709-DBFB-450A-B333-A58F69461A00",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-365\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CAED5DA-800C-4442-BC88-3AC82180F1AA",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-365\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A3B754A9-F107-4336-8B80-D74B4EC0A606",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-364\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "87F9FA7F-D1B8-4C5E-9981-067A2D66E015",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-364\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2DD0E12-B916-4D5D-8407-D642A2B79998",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "496AE8E5-8E5A-4D93-9D1E-F558AC67B292",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6330A839-FAE3-43EB-B1AA-BA6844D9906D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FCCCC46-B213-4EC8-B8DF-BE7774C7731E",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54E13E9C-226E-4BD6-8F0C-3061092E892A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00E7270D-BA8B-482E-B15B-5F92F8646CB8",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324FC413-AC5B-41A7-891A-F1A804F8C25E",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "291B13B5-3895-4F06-9CB9-C81BBE4961C2",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21D094-AE7C-4501-83F1-0884CB549F3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CE4410A1-EF14-47A1-91BB-30AD9340E38C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7519056-04A3-4E7A-AF71-BF459E0E6141",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F67429CE-3C16-4EB8-8373-F963947FCB17",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B4137-C73C-47D0-8489-CA0EF41ED9A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D88C6F15-0379-47C4-ADB4-9CB7661AD044",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2C91AA-9BD8-4856-B9AB-8E6CEAF8C8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2C70D5A-7780-40B4-B3A9-79964324E32C",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EB6B55-D27F-4939-832A-A391F6A3E89A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "26E6806C-0EEF-4772-A64D-1C2124518991",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7862FE67-A0D9-4E4D-B7BD-EB70CF0260A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "94C15A80-4AB7-46A8-8ADC-A57A07F4CFA4",
"versionEndExcluding": "fw11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
}
],
"id": "CVE-2023-1150",
"lastModified": "2024-11-21T07:38:33.400",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-06-26T07:15:08.877",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-772"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-34595
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:25
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD330AD-254E-4E3E-A17E-BE08305AFBA0",
"versionEndExcluding": "2.4.7.56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "EC36E0FD-2487-4BA0-9EB8-174D30FD4DFB",
"versionEndExcluding": "2.4.7.56",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite."
},
{
"lang": "es",
"value": "Una petici\u00f3n dise\u00f1ada con valores no v\u00e1lidos puede causar un acceso de lectura o escritura fuera de l\u00edmites en CODESYS V2 Runtime Toolkit 32 Bit full y PLCWinNT versiones anteriores a V2.4.7.56, resultando en una condici\u00f3n de denegaci\u00f3n de servicio o una escritura excesiva de memoria local"
}
],
"id": "CVE-2021-34595",
"lastModified": "2025-08-15T20:25:40.657",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-26T10:15:08.070",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-823"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-34596
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:24
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AD330AD-254E-4E3E-A17E-BE08305AFBA0",
"versionEndExcluding": "2.4.7.56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*",
"matchCriteriaId": "EC36E0FD-2487-4BA0-9EB8-174D30FD4DFB",
"versionEndExcluding": "2.4.7.56",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition."
},
{
"lang": "es",
"value": "Una petici\u00f3n dise\u00f1ada puede causar un acceso de lectura a un puntero no inicializado en CODESYS V2 Runtime Toolkit 32 Bit full y PLCWinNT versiones anteriores a V2.4.7.56, resultando en una condici\u00f3n de denegaci\u00f3n de servicio"
}
],
"id": "CVE-2021-34596",
"lastModified": "2025-08-15T20:24:15.653",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-26T10:15:08.127",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-824"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-34584
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:26
Severity ?
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Summary
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
},
{
"lang": "es",
"value": "Unas peticiones del servidor web dise\u00f1adas pueden ser usadas para leer parcialmente la pila o la memoria de la pila o pueden desencadenar una situaci\u00f3n de denegaci\u00f3n de servicio debido a un bloqueo en el servidor web de CODESYS V2 versiones anteriores a 1.1.9.22"
}
],
"id": "CVE-2021-34584",
"lastModified": "2025-08-15T20:26:40.257",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-26T10:15:07.850",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "info@cert.vde.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-126"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-34586
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:26
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition."
},
{
"lang": "es",
"value": "En el servidor web de CODESYS V2 versiones anteriores a 1.1.9.22, unas peticiones del servidor web dise\u00f1adas pueden causar una desreferencia de puntero Null en el servidor web de CODESYS y puede resultar en una condici\u00f3n de denegaci\u00f3n de servicio"
}
],
"id": "CVE-2021-34586",
"lastModified": "2025-08-15T20:26:04.430",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-26T10:15:07.957",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "info@cert.vde.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-34583
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:26
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
},
{
"lang": "es",
"value": "Unas peticiones del servidor web dise\u00f1adas pueden causar un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria y, por tanto, podr\u00edan desencadenar una situaci\u00f3n de denegaci\u00f3n de servicio debido a un bloqueo en el servidor web de CODESYS V2 versiones anteriores a 1.1.9.22"
}
],
"id": "CVE-2021-34583",
"lastModified": "2025-08-15T20:26:48.343",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-26T10:15:07.607",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "info@cert.vde.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-122"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-34585
Vulnerability from fkie_nvd - Published: 2021-10-26 10:15 - Updated: 2025-08-15 20:26
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CB62B4CC-6336-4B55-94D7-2B36CA7026E9",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "14796840-D7CC-4F28-9804-8155B780C5C2",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F88F6E08-2D1B-4B34-B8DB-40292C0BBEB2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7DB904-69F4-4588-9572-7E45D0DC0001",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0631884-FF6F-4AA9-9D76-CDECB5A738FC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8779C92D-599D-4D99-8707-A190A81DD93C",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8303BFCA-85EA-45E3-BC60-4950EECFA480",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D6739E1-EF0B-48EE-90FC-5708756FC362",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A51ABA8B-6DF5-45DB-89C9-ED116FA9CAD2",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D78A1283-111B-462E-A958-DB7212D7B04A",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFEAC4D9-15CF-44B8-844D-C012AA4637A2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8DC4322-1B14-4337-B611-23B9F8938D21",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6FE51647-62C1-4D3C-91FA-13ACA6CD71D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C167AB43-9D9C-44F4-A3C3-892562830DB7",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1379D65-F376-4618-B708-5E59D64C8033",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48B9BDDC-063F-493D-AC1E-180F04086699",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7712F56E-AEBA-4DE0-9172-26F3D29B369B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C91305B6-0AD5-447C-9E8B-905D9065F938",
"versionEndExcluding": "fw17",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*",
"matchCriteriaId": "57919AAB-2962-4543-810A-C143300351F8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F3F2723-F1D6-4565-BEB6-D3A4ABF8CD5D",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11751A8B-FCFD-433B-9065-B4FC85168A93",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "78B2640E-D3E0-46EB-B832-B026249DCCD1",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F3207286-CD18-45BB-9578-3C004D48CC72",
"versionEndExcluding": "fw10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC04ED1-1CB4-480F-AA0E-648B3CDDE748",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD2A9AC3-C6BC-4717-9965-6BD8DA0850BB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC428EC8-532A-4825-BCE3-C42A4BC01C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3320B6C9-B791-48BC-8AD7-4557FE161193",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF14BE1-1EB5-423B-9FE7-E401AEF92553",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "56E7D2FB-09FF-49AF-A82F-C48A9EDFCAFB",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2859D0D6-5FF0-497C-ABA5-3DC03F4CB526",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4EE3EC4B-99B4-42A0-BBED-C30BF271D7CD",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3273B8-13BD-4FCD-826D-D41AFA443E56",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB755670-0195-4819-9D43-70FE1F365E32",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A88C970A-99B7-4E9B-87C4-5FC04D798931",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95C3EC2D-0E70-4DA1-9203-75B7069A616E",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C15ACE6-923E-4663-8EBC-06A3AB0063D7",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF2ADD-529D-43C7-9BB8-E384BBB4C6B4",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C00EB9A1-8709-40D9-8028-615980927BFA",
"versionEndExcluding": "fw20",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:codesys:codesys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "00DD970C-3E55-4EDC-A335-3C71C19B0E99",
"versionEndExcluding": "1.1.9.22",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation."
},
{
"lang": "es",
"value": "En el servidor web de CODESYS V2 versiones anteriores a 1.1.9.22, unas peticiones de servidor web dise\u00f1adas pueden desencadenar un error de an\u00e1lisis. Dado que el resultado del analizador no se comprueba en todas las condiciones, puede producirse una desreferencia de puntero con una direcci\u00f3n no v\u00e1lida. Esto conlleva a una situaci\u00f3n de denegaci\u00f3n de servicio"
}
],
"id": "CVE-2021-34585",
"lastModified": "2025-08-15T20:26:31.073",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2021-10-26T10:15:07.907",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "info@cert.vde.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-252"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2021-34578
Vulnerability from fkie_nvd - Published: 2021-08-31 11:15 - Updated: 2024-11-21 06:10
Severity ?
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en-us/advisories/vde-2020-044 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2020-044 | Third Party Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| wago | 750-890\/040-000_firmware | * | |
| wago | 750-890\/040-000 | - | |
| wago | 750-890\/025-001_firmware | * | |
| wago | 750-890\/025-001 | - | |
| wago | 750-890\/025-002_firmware | * | |
| wago | 750-890\/025-002 | - | |
| wago | 750-890\/025-000_firmware | * | |
| wago | 750-890\/025-000 | - | |
| wago | 750-832\/000-002_firmware | * | |
| wago | 750-832\/000-002 | - | |
| wago | 750-362_firmware | * | |
| wago | 750-362 | - | |
| wago | 750-823_firmware | * | |
| wago | 750-823 | - | |
| wago | 750-832_firmware | * | |
| wago | 750-832 | - | |
| wago | 750-363_firmware | * | |
| wago | 750-363 | - | |
| wago | 750-862_firmware | * | |
| wago | 750-862 | - | |
| wago | 750-891_firmware | * | |
| wago | 750-891 | - | |
| wago | 750-893_firmware | * | |
| wago | 750-893 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8A2236BD-E06A-400E-9211-AA2C49E72D55",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7862FE67-A0D9-4E4D-B7BD-EB70CF0260A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "274284C1-1A85-455B-8769-B89A3A791B11",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC2C91AA-9BD8-4856-B9AB-8E6CEAF8C8EC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C61B3D-E690-422E-87CB-C57576D28BB7",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "21EB6B55-D27F-4939-832A-A391F6A3E89A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-890\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C8E5F8B-B3CD-42DF-8189-11949D6EAA39",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-890\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA0B4137-C73C-47D0-8489-CA0EF41ED9A9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832\\/000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB48D0AC-BB0D-4808-881D-F42A241B9330",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832\\/000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0F21D094-AE7C-4501-83F1-0884CB549F3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23FE888E-4932-4ADE-A9B9-8E23F481EDF3",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6330A839-FAE3-43EB-B1AA-BA6844D9906D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE00E32-0C93-47A2-9F61-7859F72ABAED",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB88572A-CB05-4B52-8BFC-05EFDC819244",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0D0957-0371-4FB2-A5B0-FE9F1FA4000A",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13D1FA8D-C8BA-4D1C-8372-DECD40177631",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCF9DCE-95D3-4F82-A24F-3217553E754A",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*",
"matchCriteriaId": "54E13E9C-226E-4BD6-8F0C-3061092E892A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "63A9D182-2CF5-4137-AACF-36B760B18A20",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA04FBFB-9E1C-4618-9FDC-70675506D8D5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F3010D6-1319-4458-B4B1-C7470B3950F9",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*",
"matchCriteriaId": "22BAABD9-A10D-4904-AA02-C37C4490B47A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D636186-A586-4A4E-ACFC-5BCB2E4F7484",
"versionEndIncluding": "fw07",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D4795D0-B90B-4643-8713-88D89172D1A5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07."
},
{
"lang": "es",
"value": "Esta vulnerabilidad permite a un atacante que tenga acceso al WBM leer y escribir par\u00e1metros de configuraci\u00f3n del dispositivo mediante el env\u00edo de peticiones espec\u00edficamente construidas sin autenticaci\u00f3n en m\u00faltiples PLCs de WAGO en versiones del firmware hasta FW07"
}
],
"id": "CVE-2021-34578",
"lastModified": "2024-11-21T06:10:44.417",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-31T11:15:07.777",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
CVE-2023-1150 (GCVE-0-2023-1150)
Vulnerability from cvelistv5 – Published: 2023-06-26 06:19 – Updated: 2024-12-05 19:07
VLAI?
Title
WAGO: Series 750-3x/-8x prone to MODBUS server DoS
Summary
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
Severity ?
7.5 (High)
CWE
- CWE-772 - Missing Release of Resource after Effective Lifetime
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | 750-332 |
Affected:
0 , ≤ FW10
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Roman Ezhov from Kaspersky
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:40:57.941Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1150",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-05T19:06:44.632463Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-05T19:07:34.007Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-362/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-363/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-364/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-365/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Roman Ezhov from Kaspersky"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
}
],
"value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-772",
"description": "CWE-772 Missing Release of Resource after Effective Lifetime",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:26:51.589Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
}
],
"source": {
"advisory": "VDE-2023-005",
"defect": [
"CERT@VDE#64392"
],
"discovery": "EXTERNAL"
},
"title": "WAGO: Series 750-3x/-8x prone to MODBUS server DoS",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1150",
"datePublished": "2023-06-26T06:19:53.942Z",
"dateReserved": "2023-03-02T05:38:38.812Z",
"dateUpdated": "2024-12-05T19:07:34.007Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1620 (GCVE-0-2023-1620)
Vulnerability from cvelistv5 – Published: 2023-06-26 06:19 – Updated: 2024-11-12 14:11
VLAI?
Title
WAGO: DoS in multiple products in multiple versions using Codesys
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
Severity ?
4.9 (Medium)
CWE
- CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Wago | 750-8202/xxx-xxx |
Affected:
FW1 , ≤ FW22 SP1
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Daniel dos Santos from Forescout
Abdelrahman Hassanien from Forescout
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:57:24.833Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1620",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T20:30:42.286955Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-12T14:11:36.673Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-8202/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8203/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8204/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8206/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8207/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8208/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8210/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8211/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8212/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8213/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8214/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8216/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8217/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-331",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-829",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-831/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-852",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-880/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-881",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-882",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-885/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-889",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel dos Santos from Forescout"
},
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Abdelrahman Hassanien from Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
}
],
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1288",
"description": "CWE-1288 Improper Validation of Consistency within Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:28:51.078Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"source": {
"advisory": "VDE-2023-006",
"defect": [
"CERT@VDE#64417"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: DoS in multiple products in multiple versions using Codesys",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1620",
"datePublished": "2023-06-26T06:19:30.928Z",
"dateReserved": "2023-03-24T10:12:26.426Z",
"dateUpdated": "2024-11-12T14:11:36.673Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1619 (GCVE-0-2023-1619)
Vulnerability from cvelistv5 – Published: 2023-06-26 06:18 – Updated: 2024-10-02 05:28
VLAI?
Title
WAGO: DoS in multiple versions of multiple products
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
Severity ?
4.9 (Medium)
CWE
- CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Wago | 750-8202/xxx-xxx |
Affected:
FW1 , ≤ FW22 SP1
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Daniel dos Santos from Forescout
Abdelrahman Hassanien from Forescout
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:57:24.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-8202/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8203/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8204/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8206/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8207/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8208/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8210/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8211/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8212/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8213/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8214/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8216/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8217/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-331",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-829",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-831/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-852",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-880/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-881",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-882",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-885/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-889",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel dos Santos from Forescout"
},
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Abdelrahman Hassanien from Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
}
],
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1288",
"description": "CWE-1288 Improper Validation of Consistency within Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:28:23.250Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"source": {
"advisory": "VDE-2023-006",
"defect": [
"CERT@VDE#64417"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: DoS in multiple versions of multiple products",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1619",
"datePublished": "2023-06-26T06:18:33.981Z",
"dateReserved": "2023-03-24T10:12:25.218Z",
"dateUpdated": "2024-10-02T05:28:23.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34596 (GCVE-0-2021-34596)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-16 22:40
VLAI?
Title
CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service
Summary
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
Severity ?
6.5 (Medium)
CWE
- CWE-824 - Access of Uninitialized Pointer
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
Runtime Toolkit 32 bit full , < V2.4.7.56
(custom)
Affected: PLCWinNT , < V2.4.7.56 (custom) |
Credits
This issue was reported by Gao Jian of NSFOCUS.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "Runtime Toolkit 32 bit full",
"versionType": "custom"
},
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "PLCWinNT",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This issue was reported by Gao Jian of NSFOCUS."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-824",
"description": "CWE-824 Access of Uninitialized Pointer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T09:55:54",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34596",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Runtime Toolkit 32 bit full",
"version_value": "V2.4.7.56"
},
{
"version_affected": "\u003c",
"version_name": "PLCWinNT",
"version_value": "V2.4.7.56"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was reported by Gao Jian of NSFOCUS."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824 Access of Uninitialized Pointer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34596",
"datePublished": "2021-10-26T09:55:54.408529Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T22:40:47.921Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34595 (GCVE-0-2021-34595)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-17 03:42
VLAI?
Title
CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service
Summary
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
Severity ?
8.1 (High)
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
Runtime Toolkit 32 bit full , < V2.4.7.56
(custom)
Affected: PLCWinNT , < V2.4.7.56 (custom) |
Credits
This issue was reported by Chen Jie and Gao Jian of NSFOCUS.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.024Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "Runtime Toolkit 32 bit full",
"versionType": "custom"
},
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "PLCWinNT",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This issue was reported by Chen Jie and Gao Jian of NSFOCUS."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-823",
"description": "CWE-823 Use of Out-of-range Pointer Offset",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T09:55:52",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34595",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Runtime Toolkit 32 bit full",
"version_value": "V2.4.7.56"
},
{
"version_affected": "\u003c",
"version_name": "PLCWinNT",
"version_value": "V2.4.7.56"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was reported by Chen Jie and Gao Jian of NSFOCUS."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-823 Use of Out-of-range Pointer Offset"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34595",
"datePublished": "2021-10-26T09:55:52.868387Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-17T03:42:53.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34586 (GCVE-0-2021-34586)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-17 03:53
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
Severity ?
7.5 (High)
CWE
- CWE-476 - NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.010Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476 NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T19:06:10",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34586",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34586",
"datePublished": "2021-10-26T09:55:49.885522Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-17T03:53:13.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34585 (GCVE-0-2021-34585)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-16 21:58
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
Severity ?
7.5 (High)
CWE
- CWE-252 - Unchecked Return Value
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.604Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-252",
"description": "CWE-252 Unchecked Return Value",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-04T09:50:08",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34585",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-252 Unchecked Return Value"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34585",
"datePublished": "2021-10-26T09:55:48.273766Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T21:58:06.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34584 (GCVE-0-2021-34584)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-16 22:25
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)
Summary
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
Severity ?
9.1 (Critical)
CWE
- CWE-126 - Buffer Over-read
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126 Buffer Over-read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-28T14:30:20",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34584",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-126 Buffer Over-read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34584",
"datePublished": "2021-10-26T09:55:46.638935Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T22:25:58.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34583 (GCVE-0-2021-34583)
Vulnerability from cvelistv5 – Published: 2021-10-26 09:55 – Updated: 2024-09-16 20:43
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)
Summary
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
Severity ?
7.5 (High)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T19:06:12",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34583",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34583",
"datePublished": "2021-10-26T09:55:45.129967Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T20:43:32.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34578 (GCVE-0-2021-34578)
Vulnerability from cvelistv5 – Published: 2021-08-31 10:33 – Updated: 2024-09-16 18:33
VLAI?
Title
WAGO: Authentication Vulnerability in Web-Based Management
Summary
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
Severity ?
9.8 (Critical)
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| WAGO | PLC |
Affected:
750-362 , ≤ FW07
(custom)
Affected: 750-363 , ≤ FW07 (custom) Affected: 750-823 , ≤ FW07 (custom) Affected: 750-832/xxx-xxx , ≤ FW07 (custom) Affected: 750-862 , ≤ FW07 (custom) Affected: 750-891 , ≤ FW07 (custom) Affected: 750-890/xxx-xxx , ≤ FW07 (custom) Affected: 750-893 , ≤ FW07 (custom) |
Credits
Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PLC",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-362",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-363",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-823",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-832/xxx-xxx",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-862",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-891",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-890/xxx-xxx",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-893",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:33:01",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
],
"solutions": [
{
"lang": "en",
"value": "Update the device to the latest FW version."
}
],
"source": {
"advisory": "VDE-2020-044",
"discovery": "EXTERNAL"
},
"title": "WAGO: Authentication Vulnerability in Web-Based Management",
"workarounds": [
{
"lang": "en",
"value": "Restrict network access to the device.\nDo not directly connect the device to the internet.\nDisable unused TCP/UDP ports.\nDisable web-based management ports 80/443 after the configuration phase"
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-31T07:00:00.000Z",
"ID": "CVE-2021-34578",
"STATE": "PUBLIC",
"TITLE": "WAGO: Authentication Vulnerability in Web-Based Management"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PLC",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "750-362",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-363",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-823",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-832/xxx-xxx",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-862",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-891",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-890/xxx-xxx",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-893",
"version_value": "FW07"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2020-044",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update the device to the latest FW version."
}
],
"source": {
"advisory": "VDE-2020-044",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "Restrict network access to the device.\nDo not directly connect the device to the internet.\nDisable unused TCP/UDP ports.\nDisable web-based management ports 80/443 after the configuration phase"
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34578",
"datePublished": "2021-08-31T10:33:01.868564Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T18:33:25.112Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1150 (GCVE-0-2023-1150)
Vulnerability from nvd – Published: 2023-06-26 06:19 – Updated: 2024-12-05 19:07
VLAI?
Title
WAGO: Series 750-3x/-8x prone to MODBUS server DoS
Summary
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
Severity ?
7.5 (High)
CWE
- CWE-772 - Missing Release of Resource after Effective Lifetime
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | 750-332 |
Affected:
0 , ≤ FW10
(semver)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Roman Ezhov from Kaspersky
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:40:57.941Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1150",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-05T19:06:44.632463Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-05T19:07:34.007Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-362/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-363/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-364/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-365/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Roman Ezhov from Kaspersky"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
}
],
"value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-772",
"description": "CWE-772 Missing Release of Resource after Effective Lifetime",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:26:51.589Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
}
],
"source": {
"advisory": "VDE-2023-005",
"defect": [
"CERT@VDE#64392"
],
"discovery": "EXTERNAL"
},
"title": "WAGO: Series 750-3x/-8x prone to MODBUS server DoS",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1150",
"datePublished": "2023-06-26T06:19:53.942Z",
"dateReserved": "2023-03-02T05:38:38.812Z",
"dateUpdated": "2024-12-05T19:07:34.007Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1620 (GCVE-0-2023-1620)
Vulnerability from nvd – Published: 2023-06-26 06:19 – Updated: 2024-11-12 14:11
VLAI?
Title
WAGO: DoS in multiple products in multiple versions using Codesys
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
Severity ?
4.9 (Medium)
CWE
- CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Wago | 750-8202/xxx-xxx |
Affected:
FW1 , ≤ FW22 SP1
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Daniel dos Santos from Forescout
Abdelrahman Hassanien from Forescout
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:57:24.833Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-1620",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T20:30:42.286955Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-12T14:11:36.673Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-8202/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8203/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8204/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8206/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8207/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8208/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8210/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8211/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8212/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8213/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8214/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8216/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8217/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-331",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-829",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-831/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-852",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-880/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-881",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-882",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-885/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-889",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel dos Santos from Forescout"
},
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Abdelrahman Hassanien from Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
}
],
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1288",
"description": "CWE-1288 Improper Validation of Consistency within Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:28:51.078Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"source": {
"advisory": "VDE-2023-006",
"defect": [
"CERT@VDE#64417"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: DoS in multiple products in multiple versions using Codesys",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1620",
"datePublished": "2023-06-26T06:19:30.928Z",
"dateReserved": "2023-03-24T10:12:26.426Z",
"dateUpdated": "2024-11-12T14:11:36.673Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-1619 (GCVE-0-2023-1619)
Vulnerability from nvd – Published: 2023-06-26 06:18 – Updated: 2024-10-02 05:28
VLAI?
Title
WAGO: DoS in multiple versions of multiple products
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
Severity ?
4.9 (Medium)
CWE
- CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Wago | 750-8202/xxx-xxx |
Affected:
FW1 , ≤ FW22 SP1
(custom)
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Daniel dos Santos from Forescout
Abdelrahman Hassanien from Forescout
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T05:57:24.337Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"vendor-advisory",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "750-8202/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8203/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8204/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8206/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8207/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8208/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8210/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8211/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8212/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8213/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8214/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8216/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-8217/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW22 SP1",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-823",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-332",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-832/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW6",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-862",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-890/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-891",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-893",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW10",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-331",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-829",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-831/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW14",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-852",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-880/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-881",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-882",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-885/xxx-xxx",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "750-889",
"vendor": "Wago",
"versions": [
{
"lessThanOrEqual": "FW16",
"status": "affected",
"version": "FW1",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel dos Santos from Forescout"
},
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Abdelrahman Hassanien from Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
}
],
"value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1288",
"description": "CWE-1288 Improper Validation of Consistency within Input",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-02T05:28:23.250Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
}
],
"source": {
"advisory": "VDE-2023-006",
"defect": [
"CERT@VDE#64417"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: DoS in multiple versions of multiple products",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2023-1619",
"datePublished": "2023-06-26T06:18:33.981Z",
"dateReserved": "2023-03-24T10:12:25.218Z",
"dateUpdated": "2024-10-02T05:28:23.250Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34596 (GCVE-0-2021-34596)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-16 22:40
VLAI?
Title
CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service
Summary
A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition.
Severity ?
6.5 (Medium)
CWE
- CWE-824 - Access of Uninitialized Pointer
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
Runtime Toolkit 32 bit full , < V2.4.7.56
(custom)
Affected: PLCWinNT , < V2.4.7.56 (custom) |
Credits
This issue was reported by Gao Jian of NSFOCUS.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.653Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "Runtime Toolkit 32 bit full",
"versionType": "custom"
},
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "PLCWinNT",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This issue was reported by Gao Jian of NSFOCUS."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-824",
"description": "CWE-824 Access of Uninitialized Pointer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T09:55:54",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34596",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 runtime: Access of Uninitialized Pointer may result in denial-of-service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Runtime Toolkit 32 bit full",
"version_value": "V2.4.7.56"
},
{
"version_affected": "\u003c",
"version_name": "PLCWinNT",
"version_value": "V2.4.7.56"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was reported by Gao Jian of NSFOCUS."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A crafted request may cause a read access to an uninitialized pointer in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-824 Access of Uninitialized Pointer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34596",
"datePublished": "2021-10-26T09:55:54.408529Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T22:40:47.921Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34595 (GCVE-0-2021-34595)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-17 03:42
VLAI?
Title
CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service
Summary
A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.
Severity ?
8.1 (High)
CWE
- CWE-823 - Use of Out-of-range Pointer Offset
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
Runtime Toolkit 32 bit full , < V2.4.7.56
(custom)
Affected: PLCWinNT , < V2.4.7.56 (custom) |
Credits
This issue was reported by Chen Jie and Gao Jian of NSFOCUS.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.024Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "Runtime Toolkit 32 bit full",
"versionType": "custom"
},
{
"lessThan": "V2.4.7.56",
"status": "affected",
"version": "PLCWinNT",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This issue was reported by Chen Jie and Gao Jian of NSFOCUS."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-823",
"description": "CWE-823 Use of Out-of-range Pointer Offset",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T09:55:52",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34595",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 runtime: out-of-bounds read or write access may result in denial-of-service"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "Runtime Toolkit 32 bit full",
"version_value": "V2.4.7.56"
},
{
"version_affected": "\u003c",
"version_name": "PLCWinNT",
"version_value": "V2.4.7.56"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This issue was reported by Chen Jie and Gao Jian of NSFOCUS."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-823 Use of Out-of-range Pointer Offset"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16878\u0026token=e5644ec405590e66aefa62304cb8632df9fc9e9c\u0026download="
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products:\n * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56\n * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34595",
"datePublished": "2021-10-26T09:55:52.868387Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-17T03:42:53.986Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34586 (GCVE-0-2021-34586)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-17 03:53
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition.
Severity ?
7.5 (High)
CWE
- CWE-476 - NULL Pointer Dereference
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.010Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-476",
"description": "CWE-476 NULL Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T19:06:10",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34586",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a null pointer dereference (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests may cause a Null pointer dereference in the CODESYS web server and may result in a denial-of-service condition."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-476 NULL Pointer Dereference"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34586",
"datePublished": "2021-10-26T09:55:49.885522Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-17T03:53:13.043Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34585 (GCVE-0-2021-34585)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-16 21:58
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)
Summary
In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation.
Severity ?
7.5 (High)
CWE
- CWE-252 - Unchecked Return Value
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.604Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-252",
"description": "CWE-252 Unchecked Return Value",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-04T09:50:08",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34585",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a pointer dereference with an invalid address (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In the CODESYS V2 web server prior to V1.1.9.22 crafted web server requests can trigger a parser error. Since the parser result is not checked under all conditions, a pointer dereference with an invalid address can occur. This leads to a denial of service situation."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-252 Unchecked Return Value"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34585",
"datePublished": "2021-10-26T09:55:48.273766Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T21:58:06.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34584 (GCVE-0-2021-34584)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-16 22:25
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)
Summary
Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
Severity ?
9.1 (Critical)
CWE
- CWE-126 - Buffer Over-read
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-126",
"description": "CWE-126 Buffer Over-read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-04-28T14:30:20",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34584",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a buffer over-read (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Crafted web server requests can be utilised to read partial stack or heap memory or may trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-126 Buffer Over-read"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34584",
"datePublished": "2021-10-26T09:55:46.638935Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T22:25:58.664Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34583 (GCVE-0-2021-34583)
Vulnerability from nvd – Published: 2021-10-26 09:55 – Updated: 2024-09-16 20:43
VLAI?
Title
CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)
Summary
Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22.
Severity ?
7.5 (High)
CWE
- CWE-122 - Heap-based Buffer Overflow
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| CODESYS | CODESYS V2 |
Affected:
all web servers , < V1.1.9.22
(custom)
|
Credits
This vulnerability was discovered by Tenable Research.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:46.979Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "CODESYS V2",
"vendor": "CODESYS",
"versions": [
{
"lessThan": "V1.1.9.22",
"status": "affected",
"version": "all web servers",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"datePublic": "2021-10-25T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-122",
"description": "CWE-122 Heap-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-26T19:06:12",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
],
"solutions": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-10-25T14:00:00.000Z",
"ID": "CVE-2021-34583",
"STATE": "PUBLIC",
"TITLE": "CODESYS V2 web server: crafted requests could trigger a heap-based buffer overflow (DoS)"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "CODESYS V2",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "all web servers",
"version_value": "V1.1.9.22"
}
]
}
}
]
},
"vendor_name": "CODESYS"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "This vulnerability was discovered by Tenable Research."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Crafted web server requests may cause a heap-based buffer overflow and could therefore trigger a denial-of- service condition due to a crash in the CODESYS V2 web server prior to V1.1.9.22."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-122 Heap-based Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download=",
"refsource": "CONFIRM",
"url": "https://customers.codesys.com/index.php?eID=dumpFile\u0026t=f\u0026f=16876\u0026token=a3f1d937f95e7034879f4f2ea8e5a99b168256a7\u0026download="
},
{
"name": "https://www.tenable.com/security/research/tra-2021-47",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2021-47"
}
]
},
"solution": [
{
"lang": "en",
"value": "CODESYS GmbH has released version V1.1.9.22 of the CODESYS V2 web server to solve the noted vulnerability issues. This version of the CODESYS V2 web server is also part of the CODESYS Development System setup version V2.3.9.68."
}
],
"source": {
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34583",
"datePublished": "2021-10-26T09:55:45.129967Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T20:43:32.357Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-34578 (GCVE-0-2021-34578)
Vulnerability from nvd – Published: 2021-08-31 10:33 – Updated: 2024-09-16 18:33
VLAI?
Title
WAGO: Authentication Vulnerability in Web-Based Management
Summary
This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07.
Severity ?
9.8 (Critical)
CWE
- CWE-287 - Improper Authentication
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| WAGO | PLC |
Affected:
750-362 , ≤ FW07
(custom)
Affected: 750-363 , ≤ FW07 (custom) Affected: 750-823 , ≤ FW07 (custom) Affected: 750-832/xxx-xxx , ≤ FW07 (custom) Affected: 750-862 , ≤ FW07 (custom) Affected: 750-891 , ≤ FW07 (custom) Affected: 750-890/xxx-xxx , ≤ FW07 (custom) Affected: 750-893 , ≤ FW07 (custom) |
Credits
Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T00:19:47.008Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "PLC",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-362",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-363",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-823",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-832/xxx-xxx",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-862",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-891",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-890/xxx-xxx",
"versionType": "custom"
},
{
"lessThanOrEqual": "FW07",
"status": "affected",
"version": "750-893",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated."
}
],
"datePublic": "2021-08-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-287",
"description": "CWE-287 Improper Authentication",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-31T10:33:01",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
],
"solutions": [
{
"lang": "en",
"value": "Update the device to the latest FW version."
}
],
"source": {
"advisory": "VDE-2020-044",
"discovery": "EXTERNAL"
},
"title": "WAGO: Authentication Vulnerability in Web-Based Management",
"workarounds": [
{
"lang": "en",
"value": "Restrict network access to the device.\nDo not directly connect the device to the internet.\nDisable unused TCP/UDP ports.\nDisable web-based management ports 80/443 after the configuration phase"
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2021-08-31T07:00:00.000Z",
"ID": "CVE-2021-34578",
"STATE": "PUBLIC",
"TITLE": "WAGO: Authentication Vulnerability in Web-Based Management"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PLC",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "750-362",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-363",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-823",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-832/xxx-xxx",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-862",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-891",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-890/xxx-xxx",
"version_value": "FW07"
},
{
"version_affected": "\u003c=",
"version_name": "750-893",
"version_value": "FW07"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Maxim Rupp (https://rupp.it) reported this vulnerability to WAGO. CERT@VDE coordinated."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "This vulnerability allows an attacker who has access to the WBM to read and write settings-parameters of the device by sending specifically constructed requests without authentication on multiple WAGO PLCs in firmware versions up to FW07."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-287 Improper Authentication"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en-us/advisories/vde-2020-044",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en-us/advisories/vde-2020-044"
}
]
},
"solution": [
{
"lang": "en",
"value": "Update the device to the latest FW version."
}
],
"source": {
"advisory": "VDE-2020-044",
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "en",
"value": "Restrict network access to the device.\nDo not directly connect the device to the internet.\nDisable unused TCP/UDP ports.\nDisable web-based management ports 80/443 after the configuration phase"
}
]
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2021-34578",
"datePublished": "2021-08-31T10:33:01.868564Z",
"dateReserved": "2021-06-10T00:00:00",
"dateUpdated": "2024-09-16T18:33:25.112Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}