Search criteria
18 vulnerabilities found for 751-9301_firmware by wago
FKIE_CVE-2022-45139
Vulnerability from fkie_nvd - Published: 2023-02-27 15:15 - Updated: 2024-11-21 07:28
Severity ?
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
"versionEndExcluding": "22",
"versionStartIncluding": "18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
}
],
"id": "CVE-2022-45139",
"lastModified": "2024-11-21T07:28:50.013",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-02-27T15:15:11.407",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2022-45140
Vulnerability from fkie_nvd - Published: 2023-02-27 15:15 - Updated: 2024-11-21 07:28
Severity ?
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
"versionEndExcluding": "22",
"versionStartIncluding": "18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
}
],
"id": "CVE-2022-45140",
"lastModified": "2024-11-21T07:28:50.143",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-02-27T15:15:11.503",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-45137
Vulnerability from fkie_nvd - Published: 2023-02-27 15:15 - Updated: 2024-11-21 07:28
Severity ?
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Mitigation, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
"versionEndExcluding": "22",
"versionStartIncluding": "18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
}
],
"id": "CVE-2022-45137",
"lastModified": "2024-11-21T07:28:49.723",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-02-27T15:15:11.203",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-45138
Vulnerability from fkie_nvd - Published: 2023-02-27 15:15 - Updated: 2024-11-21 07:28
Severity ?
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
"versionEndExcluding": "22",
"versionStartIncluding": "18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
"versionEndExcluding": "22",
"versionStartIncluding": "16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
"matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
"matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
}
],
"id": "CVE-2022-45138",
"lastModified": "2024-11-21T07:28:49.880",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
},
"published": "2023-02-27T15:15:11.317",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-306"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-3281
Vulnerability from fkie_nvd - Published: 2022-10-17 09:15 - Updated: 2024-11-21 07:19
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-042/ | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-042/ | Mitigation, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D5DC6250-0E32-4B35-9339-14B550F5C19D",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C4EEF3-EB06-4A8E-9BB2-0FE0AC3A6B7C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EB987BB3-354A-4B63-98EE-1061DDC0F39A",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3111C2A1-CABC-42BF-9EB1-66667A7269C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8101\\/000-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4ED14F5F-2CB1-4165-9DA1-21B1DFB9B4CB",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8101\\/000-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C60D279-D336-4435-A690-10B6C764DA37",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CA25E3A5-CB36-400C-B665-65EE899706A1",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1E36F3-C876-4427-A19A-2CE099D46FB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "75C31EC7-C4B6-42A1-B207-4FF9DCFA4CFD",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A409E2AA-49AC-4967-8984-070FC9AD06E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9025BECB-EFF5-4F98-81FC-D2CFE9B5447F",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CAE3784-D4AC-433A-A955-20E997A0D8C0",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B47DFA-BEAB-45F1-A590-14F229E8DF04",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5AF77F22-9B24-41C1-A82C-DDE1568AF146",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "40206D46-606A-4D3E-AC13-A8324962E0D2",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29E844CC-B9F9-4F20-A895-013127FE1AA9",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "04BA30E0-7660-4752-925B-42E251FCD36B",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6196935C-97E0-40A2-AF06-03CB72E40B0E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "556CF4FE-0ADF-40A3-98BF-B6EBD21E4D38",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E2892D5-A691-48A9-ACC9-236A50E6A40E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C3C9906-9264-4BD1-881D-EE4029ED011F",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92892299-BC0D-4426-B263-E9BD5985567E",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6F56DA20-D82B-48C7-B4AD-8534367E8D83",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB6BFEA3-19DA-48C0-8199-437D1E243D30",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8207\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C5C4BAD-7268-4367-A112-60E1A2EF6AF3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF87C18-45CA-4D41-9AF2-F1F78030E7AE",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4017EE-2806-4976-AA6A-55761458903F",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8FFE4FF4-4EE4-493F-A8CF-968215142EF4",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CABC33A8-79DF-4057-8B31-82157C589324",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8208\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B32F6244-FB19-4629-BCAB-A544C031E4BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5D8B1C2-CA67-4861-BB16-0C63FB785837",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "984E388B-01B4-449A-90F7-7083349D0333",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CF7C8131-3BE2-4515-81F0-1C7644B622B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D09DDDAA-CC72-4376-8063-C28F8CA93C51",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4432B707-86E9-424B-B018-AD162E6D0EAB",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6B08DF7-D833-4B47-A94B-60FAA37BA5B9",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/000-100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F356952-B865-49D8-889C-0A696E754C96",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6F8144D3-78E4-4129-82E5-D45E78369A77",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31B9A7B1-2457-44E7-9753-DC5828281892",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7F818CC0-0E00-4B70-863D-E2D9F1966781",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9EC1F538-875D-4337-A42E-A837173B30FF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1732E7F6-59AF-44E1-BABF-FF53EA0ABFFD",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/025-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A81CC3BB-60A3-451F-BC34-F1D03517B0E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24E22E32-203F-4EFE-B45B-EB4C01E471DA",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D90E8E11-21C4-4DD8-84CC-E92FABC268DB",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
"matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8215_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6833CDAD-CE68-4BD5-9249-615E3270E7D9",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8215:-:*:*:*:*:*:*:*",
"matchCriteriaId": "577EDC26-671C-4703-BBF0-FE93AFEA81E1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6043375C-A893-4C6E-839E-D17EB307BF19",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "857852B7-A725-496A-B518-634770BA2666",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FAD81900-6337-4EB9-ABA5-836452AF3E59",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F5FD30E2-6A83-410B-9B4D-F9FEFFCB2C42",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E3ED9EED-726C-4217-ABFE-CE0DE8BB902E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "638DB5C9-CA27-45E9-BC25-67956A4ECC13",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "977A1B79-8D15-49D8-8C58-F7B1FFDF0E8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06D72826-1991-4DA7-85A6-E0A289AA8863",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49A39AFE-BC17-4A09-ABCE-271C2BB9AA07",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8453B287-3BAF-469D-A7F7-E08F43911A6C",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8206\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B851D224-DFC0-4D96-AE88-0B7AF75FBCD8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D1C9E1F8-CA8B-4CC0-8FB9-755AC9ADE8E7",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8210\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "50421963-086D-4B34-BCDA-1EA971708B73",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24A8B55C-CC09-42E5-9CC5-A738D9A2F562",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8211\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4921C3E3-0ED0-4ECB-B791-BE3AE48D6F92",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DE0687A5-28D6-4A79-BFD5-CBE1AB2679BB",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26478046-3D53-45DB-B5B9-EE160383C9E2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC04BB0-4DA5-4BAC-9ECD-21A3532ECFC4",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F94E5197-2913-488F-8E9C-AA14A4976726",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AA1D0FD-0CFB-4528-81BC-D16D1D24AB5C",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8212\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF110184-7737-417A-8C9C-2F30FA8091C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5C3BF7F4-9D64-43AC-BBE8-BFA99C2369E6",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8213\\/040-010:-:*:*:*:*:*:*:*",
"matchCriteriaId": "764647F1-F01F-42CD-94B6-D46494BDC1A0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "687EE280-9DED-4AA6-9EC8-0DF31F2209E2",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8216\\/040-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A56C1204-6939-4353-A917-5B3542A889D3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B11C662B-6FED-460F-A597-120510525B4F",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.04.10\\(16\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "89358BFC-290C-4C45-82E7-7CA0D634F9C4",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.04.10\\(16\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6494874B-DB89-4C9C-BF6E-EB775D19C6B5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31DFB86E-3A92-4B31-9D31-E213971A7D39",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.04.10\\(16\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/600-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D733746C-0F1D-49CB-BB1A-E8409E891389",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A6A5994B-541D-49CA-BF2A-359AB380655C",
"versionEndIncluding": "03.10.08\\(22\\)",
"versionStartIncluding": "03.04.10\\(16\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8217\\/625-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4228ED9E-36C8-4F01-9447-D1D58C3BD6C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4C3AB078-2016-41A1-93CC-67CED757560C",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E54B6A-82B1-4AFA-BBA0-1998B5DE0BBD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EACF93EA-FC9D-4DD4-B0D5-A8E2EBF9D1E7",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09484C17-CD67-44E3-BA2D-0F718D888B0F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A59E0FBC-E98F-4BD5-81CB-BEF9F0DFEB62",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E5672E3-7B4C-4FAF-955E-04EEB9E5B210",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D0A70708-362F-4C08-8D25-9222F38C5C48",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1C9E9B25-5C96-4665-9DC2-DD11905331AE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC0F28C-D8ED-4F1E-8126-00E3FF199184",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A646213B-FF88-4A28-91B8-E21BD3710DF1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B1496B0-06DC-45B8-9CDA-A58C0F0929DF",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39A1F780-B010-4C95-B1B8-3A2D34938223",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9831294A-79D7-4F95-9564-2DF721B80076",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BD64BCDC-A7F2-4E8C-886D-C0D9268D0DA8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E808AA13-4095-480E-BE9D-4961DB901AC9",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5FDBE05B-7ACB-4DB5-8D2F-7FCEC626E161",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53A52FF3-7FCF-453E-8553-E1743D8C2B2B",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A5421E8-67EA-4D0D-889F-A64DA70E7695",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8AF5E6BE-E751-4FE3-950C-A220B2966EE4",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4DB95678-6815-4FB6-AA22-E6FEC011B269",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49315880-9359-441F-8A91-66D39297B25E",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D71684E3-7724-4662-B579-64BEE0EA9EFE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7833D5-E7D7-433C-978C-9A657ADABE99",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*",
"matchCriteriaId": "08B20B1D-FD2D-4C74-AE22-66C7FC4F126A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA3687EB-0725-48A2-8767-CAFAA4DB03D5",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B46B51E-5EB2-4D8D-B77E-00D1EBAF1429",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2A26B2C3-0D97-4AC9-A2E3-759645C92AB0",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCAB7B7A-8081-4F8D-8304-E05FA68CE2F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52C83BB3-41FA-417A-BF7B-2B29878C5D8C",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DBE3A7A-F96D-41B8-A150-BA5DC144DAA1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8828E6F6-256B-4886-9A09-203AE24591DF",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F3EE3467-287E-4729-8C2B-3F43B92A49B8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4748774-2371-4FB7-A44A-FEDC82FE35CF",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B53684-BFE1-4100-9624-A034119E7CAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E7F18C79-0D0B-4DA3-966D-0F8323871D2D",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD7B74F-71F9-4B0F-A9EB-EEA6FBEF81FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F2CEE9FD-D92E-41EC-AE19-67B1196AF441",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D4FF612-453D-4287-8989-2779A6F6A0A7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C7843674-EBC2-46E6-890E-E5FA46B5E6D0",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "80089A85-1174-4E47-BC36-69DD11A3FFF8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7D72E1BB-E04E-49CB-B35A-AF2BEC9110D4",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91554389-BCF9-48EB-B198-A192BAE6206D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F43ABF1-DB17-4077-8628-12C04488DD2A",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E65CA42E-371C-407C-84F9-64AC3F02FFE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D758DDD0-D1E4-46A1-89E3-438976D5B5BA",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D2BEE4ED-2C15-4E52-8FEC-BB7B5742274F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "65695E4D-56B8-4155-A87D-3D8E8936EF80",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FF4E78EB-C91E-4E92-AF9F-90300EE96E03",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37DA2954-1735-4339-91B0-9FD9A33E43EB",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C98F37AB-BFC5-49C2-B8FD-21AA0266C703",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C9B5B522-DF06-4D7B-B61E-591DB7BEBE93",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "422F9EEC-8516-4692-93DE-BB0F385D2BD1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B290C86-57A5-4875-9071-27F9ED66F77E",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "742F9265-3770-4B4E-A327-2202E2DAEA84",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2AC9B06-0691-4A18-B7EA-FA2FFFAB872D",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FDB659-7FF2-4272-9818-3517AC55BFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E370F98-3A05-41C7-B9CC-710B8DD57DDE",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7E5506-BA01-4B6F-9475-3F2056019858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D2A6505-0352-43A7-94A3-DF69CA9F6CFD",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.01.07\\(13\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8E97AD-B5B4-4F54-A8B8-52E83F34C33D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85CC9336-F4D3-4463-8182-0A0AB9CA58D9",
"versionEndIncluding": "03.10.09\\(22\\)",
"versionStartIncluding": "03.06.09\\(18\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1994DE6D-FEAC-4F3E-8201-7661D0D18C6F",
"versionEndIncluding": "03.09.08\\(21\\)",
"versionStartIncluding": "03.07.17\\(19\\)",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
},
{
"lang": "es",
"value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller en varias versiones son propensos a perder el filtrado de direcciones MAC tras el reinicio. Esto puede permitir a un atacante remoto omitir el alcance de la red que deber\u00eda estar protegida por el filtro de direcciones MAC"
}
],
"id": "CVE-2022-3281",
"lastModified": "2024-11-21T07:19:12.523",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
},
"published": "2022-10-17T09:15:12.387",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-440"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
}
]
}
FKIE_CVE-2022-22511
Vulnerability from fkie_nvd - Published: 2022-03-09 20:15 - Updated: 2024-11-21 06:46
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.
References
| URL | Tags | ||
|---|---|---|---|
| info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-004/ | Mitigation, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-004/ | Mitigation, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9769E19F-647E-4D9D-8EE2-6EF904791975",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
"matchCriteriaId": "33C4EEF3-EB06-4A8E-9BB2-0FE0AC3A6B7C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1AB98C15-94A8-47C5-A84E-6AA18E7CF649",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3111C2A1-CABC-42BF-9EB1-66667A7269C7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "349C3E37-19E3-4B31-912F-89FCA6DFA5F2",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A409E2AA-49AC-4967-8984-070FC9AD06E3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "203DDFEB-EA37-47FB-8F64-351447C98029",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
"matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B584298-D794-4C1F-9C53-EECE772A82CF",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "55343A61-9614-4D8A-ACE4-4A211890087F",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2569546-AC58-420F-8FE6-90BA904DF6AF",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D438FEE4-B4E9-4331-8372-CFE1E09FF18D",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C88834C9-E823-4B11-91D2-8E2264D5E3D2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC74498C-E578-4ACF-8CF9-475A13D6966C",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6C67678-4BC4-417A-AD6E-FB60B0F7A384",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FC72ABF2-808D-4489-B484-23A414572CBF",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "082B2ECB-179E-4DE9-856F-EDDBB42AF318",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "29641D55-A6FC-4DF0-9835-EFC602E80824",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "13B53684-BFE1-4100-9624-A034119E7CAA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8BE1648-BB62-48FA-B640-448DE9FFFCB9",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CD7B74F-71F9-4B0F-A9EB-EEA6FBEF81FB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F52DE71F-A806-4134-A68A-08BCECE4D025",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91554389-BCF9-48EB-B198-A192BAE6206D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B13A1069-E504-4E82-9663-4F5E3CC2265D",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E65CA42E-371C-407C-84F9-64AC3F02FFE2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4844CF1-908E-4512-97E4-3D414771BD19",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "742F9265-3770-4B4E-A327-2202E2DAEA84",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AC84C72E-1CC6-4BE0-8739-3771D92BD9FA",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3FDB659-7FF2-4272-9818-3517AC55BFFD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3A25CB9B-B3DD-401C-9C6C-8BC4B3C65182",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1E7E5506-BA01-4B6F-9475-3F2056019858",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "832CEF06-63A6-4B75-BE74-5B3317AE1D40",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E8E97AD-B5B4-4F54-A8B8-52E83F34C33D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8B6D5661-EA0E-4547-AF7E-FCE892F350F6",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "12E0BDFB-A3EF-40A6-8561-D00A7E730AFC",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-82_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79536E94-5490-48BD-B69C-CB45CF566466",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-82:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B473F98C-E92B-4101-8BCF-1644AD7DE086",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "716CF02C-2B1B-4D4B-BFBF-025B5C2E47DB",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70FFC025-A170-466D-8BA5-C377CFA3589B",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
"matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9EA990-BC71-4141-9C18-DE3F8CDAFD2F",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5B99800-C5E6-4001-BCBA-2DB5E3CF7D8D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1EB4611-4028-4360-9E29-A44E16AF7311",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC647C3-A602-412F-A4DA-5ED092E2779C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9223E3-B708-40BA-A811-A03F614056B3",
"versionEndExcluding": "fw22",
"versionStartIncluding": "fw16",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
"matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
},
{
"lang": "es",
"value": "Varias p\u00e1ginas de configuraci\u00f3n del dispositivo son vulnerables a ataques de tipo XSS (Cross-Site Scripting) reflejados. Un atacante autorizado con privilegios de usuario puede usar esto para conseguir acceso a informaci\u00f3n confidencial en un PC que sea conectado al WBM despu\u00e9s de haber sido comprometido"
}
],
"id": "CVE-2022-22511",
"lastModified": "2024-11-21T06:46:55.623",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "info@cert.vde.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-09T20:15:08.367",
"references": [
{
"source": "info@cert.vde.com",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Third Party Advisory"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
],
"sourceIdentifier": "info@cert.vde.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "info@cert.vde.com",
"type": "Secondary"
}
]
}
CVE-2022-45140 (GCVE-0-2022-45140)
Vulnerability from cvelistv5 – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:46
VLAI?
Title
WAGO: Missing Authentication for Critical Function
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.436Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45140",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:46:43.476712Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:46:52.078Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
}
],
"value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:39.448Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Missing Authentication for Critical Function ",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45140",
"datePublished": "2023-02-27T14:36:39.448Z",
"dateReserved": "2022-11-10T09:46:59.080Z",
"dateUpdated": "2025-03-10T17:46:52.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45139 (GCVE-0-2022-45139)
Vulnerability from cvelistv5 – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:46
VLAI?
Title
WAGO: Origin validation error through CORS misconfiguration
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
Severity ?
5.3 (Medium)
CWE
- CWE-346 - Origin Validation Error
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.406Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45139",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:45:54.261351Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:46:16.888Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
}
],
"value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
}
],
"impacts": [
{
"capecId": "CAPEC-554",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-554 Functionality Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "CWE-346 Origin Validation Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:32.016Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Origin validation error through CORS misconfiguration",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45139",
"datePublished": "2023-02-27T14:36:32.016Z",
"dateReserved": "2022-11-10T09:46:59.080Z",
"dateUpdated": "2025-03-10T17:46:16.888Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45138 (GCVE-0-2022-45138)
Vulnerability from cvelistv5 – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:20
VLAI?
Title
WAGO: Missing Authentication for Critical Function
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.415Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45138",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:20:33.215201Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:20:50.798Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
}
],
"value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:20.474Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Missing Authentication for Critical Function",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45138",
"datePublished": "2023-02-27T14:36:20.474Z",
"dateReserved": "2022-11-10T09:46:59.079Z",
"dateUpdated": "2025-03-10T17:20:50.798Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45137 (GCVE-0-2022-45137)
Vulnerability from cvelistv5 – Published: 2023-02-27 14:36 – Updated: 2024-08-03 14:09
VLAI?
Title
WAGO: Reflective Cross-Site Scripting
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:56.545Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
}
],
"value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:03.411Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Reflective Cross-Site Scripting",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45137",
"datePublished": "2023-02-27T14:36:03.411Z",
"dateReserved": "2022-11-10T09:46:59.079Z",
"dateUpdated": "2024-08-03T14:09:56.545Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3281 (GCVE-0-2022-3281)
Vulnerability from cvelistv5 – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Title
WAGO: multiple products - Loss of MAC-Address-Filtering after reboot
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
Severity ?
7.5 (High)
CWE
- CWE-440 - Expected Behavior Violation
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | 750-81xx/xxx-xxx Series PFC100/PFC200 |
Affected:
03.01.07(13) , ≤ 03.10.08(22)
(custom)
|
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:07:06.534Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3281",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-10T02:56:08.488527Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-10T02:56:32.932Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "750-81xx/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "750-8217/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.04.10(16)",
"versionType": "custom"
}
]
},
{
"product": "750-82xx/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "Compact Controller CC100",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.09.08(21)",
"status": "affected",
"version": "03.07.17(19)",
"versionType": "custom"
}
]
},
{
"product": "762-4xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "762-5xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "762-6xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "752-8303/8000-002 Edge Controller",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.06.09(18)",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-10-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-440",
"description": "CWE-440 Expected Behavior Violation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-02T00:00:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
}
],
"source": {
"advisory": "VDE-2022-042",
"defect": [
"CERT@VDE#64236"
],
"discovery": "INTERNAL"
},
"title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
"x_generator": {
"engine": "vulnogram 0.1.0-rc1"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-3281",
"datePublished": "2022-10-17T08:20:12.389Z",
"dateReserved": "2022-09-23T00:00:00.000Z",
"dateUpdated": "2025-05-10T02:56:32.932Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-22511 (GCVE-0-2022-22511)
Vulnerability from cvelistv5 – Published: 2022-03-09 19:38 – Updated: 2024-09-17 00:16
VLAI?
Title
WAGO PLCs WBM vulnerable to reflected XSS
Summary
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Cross-site Scripting (XSS)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:14:55.300Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
},
{
"product": "Series Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
},
{
"product": "Series Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
}
],
"datePublic": "2022-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T19:38:43",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
],
"solutions": [
{
"lang": "en",
"value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
}
],
"source": {
"advisory": "VDE-2022-004",
"defect": [
"CERT@VDE#64068"
],
"discovery": "EXTERNAL"
},
"title": "WAGO PLCs WBM vulnerable to reflected XSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2022-03-09T07:00:00.000Z",
"ID": "CVE-2022-22511",
"STATE": "PUBLIC",
"TITLE": "WAGO PLCs WBM vulnerable to reflected XSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Compact Controller CC100 (751-9301)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Edge Controller (752-8303/8000-002)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series PFC100 (750-81xx/xxx-xxx)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series PFC200 (750-82xx/xxx-xxx)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Advanced Line (762-5xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Marine Line (762-6xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Standard Line (762-4xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en/advisories/VDE-2022-004/",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
]
},
"solution": [
{
"lang": "en",
"value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
}
],
"source": {
"advisory": "VDE-2022-004",
"defect": [
"CERT@VDE#64068"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-22511",
"datePublished": "2022-03-09T19:38:43.516457Z",
"dateReserved": "2022-01-03T00:00:00",
"dateUpdated": "2024-09-17T00:16:00.059Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45140 (GCVE-0-2022-45140)
Vulnerability from nvd – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:46
VLAI?
Title
WAGO: Missing Authentication for Critical Function
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.436Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45140",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:46:43.476712Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:46:52.078Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
}
],
"value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:39.448Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Missing Authentication for Critical Function ",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45140",
"datePublished": "2023-02-27T14:36:39.448Z",
"dateReserved": "2022-11-10T09:46:59.080Z",
"dateUpdated": "2025-03-10T17:46:52.078Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45139 (GCVE-0-2022-45139)
Vulnerability from nvd – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:46
VLAI?
Title
WAGO: Origin validation error through CORS misconfiguration
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
Severity ?
5.3 (Medium)
CWE
- CWE-346 - Origin Validation Error
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.406Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45139",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:45:54.261351Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:46:16.888Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
}
],
"value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
}
],
"impacts": [
{
"capecId": "CAPEC-554",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-554 Functionality Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "CWE-346 Origin Validation Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:32.016Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Origin validation error through CORS misconfiguration",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45139",
"datePublished": "2023-02-27T14:36:32.016Z",
"dateReserved": "2022-11-10T09:46:59.080Z",
"dateUpdated": "2025-03-10T17:46:16.888Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45138 (GCVE-0-2022-45138)
Vulnerability from nvd – Published: 2023-02-27 14:36 – Updated: 2025-03-10 17:20
VLAI?
Title
WAGO: Missing Authentication for Critical Function
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
Severity ?
9.8 (Critical)
CWE
- CWE-306 - Missing Authentication for Critical Function
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:55.415Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-45138",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-10T17:20:33.215201Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-10T17:20:50.798Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
}
],
"value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-306",
"description": "CWE-306 Missing Authentication for Critical Function",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:20.474Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Missing Authentication for Critical Function",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45138",
"datePublished": "2023-02-27T14:36:20.474Z",
"dateReserved": "2022-11-10T09:46:59.079Z",
"dateUpdated": "2025-03-10T17:20:50.798Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-45137 (GCVE-0-2022-45137)
Vulnerability from nvd – Published: 2023-02-27 14:36 – Updated: 2024-08-03 14:09
VLAI?
Title
WAGO: Reflective Cross-Site Scripting
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
Unaffected: FW22 Patch 1 Affected: FW23 |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T14:09:56.545Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW18",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
},
{
"status": "unaffected",
"version": "FW22 Patch 1"
},
{
"status": "affected",
"version": "FW23"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
}
],
"value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
}
],
"impacts": [
{
"capecId": "CAPEC-63",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-63 Cross-Site Scripting (XSS)"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-02-27T14:36:03.411Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
}
],
"source": {
"defect": [
"CERT@VDE#64160"
],
"discovery": "UNKNOWN"
},
"title": "WAGO: Reflective Cross-Site Scripting",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-45137",
"datePublished": "2023-02-27T14:36:03.411Z",
"dateReserved": "2022-11-10T09:46:59.079Z",
"dateUpdated": "2024-08-03T14:09:56.545Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-3281 (GCVE-0-2022-3281)
Vulnerability from nvd – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Title
WAGO: multiple products - Loss of MAC-Address-Filtering after reboot
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
Severity ?
7.5 (High)
CWE
- CWE-440 - Expected Behavior Violation
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | 750-81xx/xxx-xxx Series PFC100/PFC200 |
Affected:
03.01.07(13) , ≤ 03.10.08(22)
(custom)
|
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T01:07:06.534Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2022-3281",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-10T02:56:08.488527Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-10T02:56:32.932Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "750-81xx/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "750-8217/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.04.10(16)",
"versionType": "custom"
}
]
},
{
"product": "750-82xx/xxx-xxx Series PFC100/PFC200",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.08(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "Compact Controller CC100",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.09.08(21)",
"status": "affected",
"version": "03.07.17(19)",
"versionType": "custom"
}
]
},
{
"product": "762-4xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "762-5xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "762-6xxx Series Touch Panel 600",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.01.07(13)",
"versionType": "custom"
}
]
},
{
"product": "752-8303/8000-002 Edge Controller",
"vendor": "WAGO",
"versions": [
{
"lessThanOrEqual": "03.10.09(22)",
"status": "affected",
"version": "03.06.09(18)",
"versionType": "custom"
}
]
}
],
"datePublic": "2022-10-17T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-440",
"description": "CWE-440 Expected Behavior Violation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-11-02T00:00:00.000Z",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
}
],
"source": {
"advisory": "VDE-2022-042",
"defect": [
"CERT@VDE#64236"
],
"discovery": "INTERNAL"
},
"title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
"x_generator": {
"engine": "vulnogram 0.1.0-rc1"
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-3281",
"datePublished": "2022-10-17T08:20:12.389Z",
"dateReserved": "2022-09-23T00:00:00.000Z",
"dateUpdated": "2025-05-10T02:56:32.932Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-22511 (GCVE-0-2022-22511)
Vulnerability from nvd – Published: 2022-03-09 19:38 – Updated: 2024-09-17 00:16
VLAI?
Title
WAGO PLCs WBM vulnerable to reflected XSS
Summary
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Cross-site Scripting (XSS)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| WAGO | Compact Controller CC100 (751-9301) |
Affected:
FW16 , < FW22
(custom)
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||
Credits
These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:14:55.300Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Compact Controller CC100 (751-9301)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Edge Controller (752-8303/8000-002)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series PFC100 (750-81xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series PFC200 (750-82xx/xxx-xxx)",
"vendor": "WAGO",
"versions": [
{
"lessThan": "FW22",
"status": "affected",
"version": "FW16",
"versionType": "custom"
}
]
},
{
"product": "Series Touch Panel 600 Advanced Line (762-5xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
},
{
"product": "Series Touch Panel 600 Marine Line (762-6xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
},
{
"product": "Series Touch Panel 600 Standard Line (762-4xxx)",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "FW16 FW22"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
}
],
"datePublic": "2022-03-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Cross-site Scripting (XSS)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-09T19:38:43",
"orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"shortName": "CERTVDE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
],
"solutions": [
{
"lang": "en",
"value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
}
],
"source": {
"advisory": "VDE-2022-004",
"defect": [
"CERT@VDE#64068"
],
"discovery": "EXTERNAL"
},
"title": "WAGO PLCs WBM vulnerable to reflected XSS",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "info@cert.vde.com",
"DATE_PUBLIC": "2022-03-09T07:00:00.000Z",
"ID": "CVE-2022-22511",
"STATE": "PUBLIC",
"TITLE": "WAGO PLCs WBM vulnerable to reflected XSS"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Compact Controller CC100 (751-9301)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Edge Controller (752-8303/8000-002)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series PFC100 (750-81xx/xxx-xxx)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series PFC200 (750-82xx/xxx-xxx)",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Advanced Line (762-5xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Marine Line (762-6xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
},
{
"product_name": "Series Touch Panel 600 Standard Line (762-4xxx)",
"version": {
"version_data": [
{
"version_name": "FW16",
"version_value": "FW22"
}
]
}
}
]
},
"vendor_name": "WAGO"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79 Cross-site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/en/advisories/VDE-2022-004/",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
}
]
},
"solution": [
{
"lang": "en",
"value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
}
],
"source": {
"advisory": "VDE-2022-004",
"defect": [
"CERT@VDE#64068"
],
"discovery": "EXTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
"assignerShortName": "CERTVDE",
"cveId": "CVE-2022-22511",
"datePublished": "2022-03-09T19:38:43.516457Z",
"dateReserved": "2022-01-03T00:00:00",
"dateUpdated": "2024-09-17T00:16:00.059Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}