Search criteria

7 vulnerabilities found for Compact Controller CC100 by WAGO

VAR-202310-0385

Vulnerability from variot - Updated: 2023-12-18 12:33

On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected. WAGO The following vulnerabilities exist in multiple products provided by . * Externally controllable reference to another region resource (CWE-610) - CVE-2023-4089If the vulnerability is exploited, it may be affected as follows

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202310-0385",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "touch panel 600 advanced",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "16"
      },
      {
        "model": "compact controller 100",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "19"
      },
      {
        "model": "pfc200",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "16"
      },
      {
        "model": "pfc100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "touch panel 600 advanced",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "touch panel 600 standard",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "16"
      },
      {
        "model": "compact controller 100",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "edge controller",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "pfc200",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "touch panel 600 marine",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "16"
      },
      {
        "model": "touch panel 600 marine",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "pfc100",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "16"
      },
      {
        "model": "edge controller",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "18"
      },
      {
        "model": "touch panel 600 standard",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "wago",
        "version": "26"
      },
      {
        "model": "edge controller",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "touch panel 600 advanced",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "touch panel 600 standard",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "pfc200",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "compact controller cc100",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "touch panel 600 marine",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      },
      {
        "model": "pfc100",
        "scope": null,
        "trust": 0.8,
        "vendor": "wago",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "19",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "18",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "16",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "16",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "16",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "16",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          },
          {
            "children": [
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "versionEndIncluding": "26",
                    "versionStartIncluding": "16",
                    "vulnerable": true
                  }
                ],
                "operator": "OR"
              },
              {
                "children": [],
                "cpe_match": [
                  {
                    "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
                    "cpe_name": [],
                    "vulnerable": false
                  }
                ],
                "operator": "OR"
              }
            ],
            "cpe_match": [],
            "operator": "AND"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "cve": "CVE-2023-4089",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "info@cert.vde.com",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 1.2,
            "impactScore": 1.4,
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "OTHER",
            "availabilityImpact": "None",
            "baseScore": 2.7,
            "baseSeverity": "Low",
            "confidentialityImpact": "Low",
            "exploitabilityScore": null,
            "id": "JVNDB-2023-007590",
            "impactScore": null,
            "integrityImpact": "None",
            "privilegesRequired": "High",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "info@cert.vde.com",
            "id": "CVE-2023-4089",
            "trust": 1.0,
            "value": "LOW"
          },
          {
            "author": "OTHER",
            "id": "JVNDB-2023-007590",
            "trust": 0.8,
            "value": "Low"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected. WAGO The following vulnerabilities exist in multiple products provided by . * Externally controllable reference to another region resource (CWE-610) - CVE-2023-4089If the vulnerability is exploited, it may be affected as follows",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "VULMON",
        "id": "CVE-2023-4089"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2023-4089",
        "trust": 2.7
      },
      {
        "db": "CERT@VDE",
        "id": "VDE-2023-046",
        "trust": 1.9
      },
      {
        "db": "JVN",
        "id": "JVNVU96020889",
        "trust": 0.8
      },
      {
        "db": "ICS CERT",
        "id": "ICSA-23-325-01",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590",
        "trust": 0.8
      },
      {
        "db": "VULMON",
        "id": "CVE-2023-4089",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-4089"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "id": "VAR-202310-0385",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.65716723
  },
  "last_update_date": "2023-12-18T12:33:31.559000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "WAGO\u00a0Global\u00a0|\u00a0Reliable\u00a0Solutions\u00a0for\u00a0Many\u00a0Sectors\u00a0and\u00a0Industories",
        "trust": 0.8,
        "url": "https://www.wago.com/global/"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-610",
        "trust": 1.0
      },
      {
        "problemtype": "Externally controllable reference to another region resource (CWE-610) [ others ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.1,
        "url": "https://cert.vde.com/en/advisories/vde-2023-046/"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/vu/jvnvu96020889/index.html"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2023-4089"
      },
      {
        "trust": 0.8,
        "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-01"
      },
      {
        "trust": 0.8,
        "url": "https://cert.vde.com/de/advisories/vde-2023-046/"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/610.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2023-4089"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULMON",
        "id": "CVE-2023-4089"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2023-4089"
      },
      {
        "date": "2023-11-24T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "date": "2023-10-17T07:15:10.090000",
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-10-17T00:00:00",
        "db": "VULMON",
        "id": "CVE-2023-4089"
      },
      {
        "date": "2023-11-24T04:24:00",
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      },
      {
        "date": "2023-10-24T18:00:38.507000",
        "db": "NVD",
        "id": "CVE-2023-4089"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "plural \u00a0WAGO\u00a0 Vulnerability of external controllable references to other domain resources in the product",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2023-007590"
      }
    ],
    "trust": 0.8
  }
}

CVE-2023-4089 (GCVE-0-2023-4089)

Vulnerability from cvelistv5 – Published: 2023-10-17 06:00 – Updated: 2025-02-27 20:40
VLAI?
Summary
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
CWE
  • CWE-610 - Externally Controlled Reference to a Resource in Another Sphere
Assigner
Impacted products
Vendor Product Version
WAGO Compact Controller CC100 Affected: FW19 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Edge Controller Affected: FW18 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC100 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC200 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Advanced Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Marine Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Standard Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
Credits
Floris Hendriks and Jeroen Wijenbergh from Radboud University
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:11.728Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4089",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T21:49:11.155380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T20:40:32.064Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW19",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW18",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Floris Hendriks and Jeroen Wijenbergh from Radboud University"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
            }
          ],
          "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-610",
              "description": "CWE-610 Externally Controlled Reference to a Resource in Another Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T06:00:28.908Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-046",
        "defect": [
          "CERT@VDE#64532"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Multiple products vulnerable to local file inclusion",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-4089",
    "datePublished": "2023-10-17T06:00:28.908Z",
    "dateReserved": "2023-08-02T07:20:35.600Z",
    "dateUpdated": "2025-02-27T20:40:32.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1698 (GCVE-0-2023-1698)

Vulnerability from cvelistv5 – Published: 2023-05-15 08:51 – Updated: 2025-01-23 19:13
VLAI?
Summary
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Credits
Quentin Kaiser from ONEKEY
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.816Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-007/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1698",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T19:12:48.907770Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T19:13:09.654Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Quentin Kaiser from ONEKEY"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise."
            }
          ],
          "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T08:51:27.453Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-007/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-007",
        "defect": [
          "CERT@VDE#64422"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: WBM Command Injection in multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1698",
    "datePublished": "2023-05-15T08:51:27.453Z",
    "dateReserved": "2023-03-29T13:00:05.618Z",
    "dateUpdated": "2025-01-23T19:13:09.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3281 (GCVE-0-2022-3281)

Vulnerability from cvelistv5 – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
CWE
  • CWE-440 - Expected Behavior Violation
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-8217/xxx-xxx Series PFC100/PFC200 Affected: 03.04.10(16) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO Compact Controller CC100 Affected: 03.07.17(19) , ≤ 03.09.08(21) (custom)
Create a notification for this product.
    WAGO 762-4xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-5xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-6xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 752-8303/8000-002 Edge Controller Affected: 03.06.09(18) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3281",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:56:08.488527Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:56:32.932Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-81xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-8217/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.04.10(16)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-82xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.09.08(21)",
              "status": "affected",
              "version": "03.07.17(19)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-4xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-5xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-6xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "752-8303/8000-002 Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.06.09(18)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-440",
              "description": "CWE-440 Expected Behavior Violation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
        }
      ],
      "source": {
        "advisory": "VDE-2022-042",
        "defect": [
          "CERT@VDE#64236"
        ],
        "discovery": "INTERNAL"
      },
      "title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-3281",
    "datePublished": "2022-10-17T08:20:12.389Z",
    "dateReserved": "2022-09-23T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:56:32.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4089 (GCVE-0-2023-4089)

Vulnerability from nvd – Published: 2023-10-17 06:00 – Updated: 2025-02-27 20:40
VLAI?
Summary
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
CWE
  • CWE-610 - Externally Controlled Reference to a Resource in Another Sphere
Assigner
Impacted products
Vendor Product Version
WAGO Compact Controller CC100 Affected: FW19 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Edge Controller Affected: FW18 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC100 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC200 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Advanced Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Marine Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Standard Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
Credits
Floris Hendriks and Jeroen Wijenbergh from Radboud University
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:11.728Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4089",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T21:49:11.155380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T20:40:32.064Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW19",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW18",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Floris Hendriks and Jeroen Wijenbergh from Radboud University"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
            }
          ],
          "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-610",
              "description": "CWE-610 Externally Controlled Reference to a Resource in Another Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T06:00:28.908Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-046",
        "defect": [
          "CERT@VDE#64532"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Multiple products vulnerable to local file inclusion",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-4089",
    "datePublished": "2023-10-17T06:00:28.908Z",
    "dateReserved": "2023-08-02T07:20:35.600Z",
    "dateUpdated": "2025-02-27T20:40:32.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1698 (GCVE-0-2023-1698)

Vulnerability from nvd – Published: 2023-05-15 08:51 – Updated: 2025-01-23 19:13
VLAI?
Summary
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Impacted products
Credits
Quentin Kaiser from ONEKEY
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.816Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-007/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1698",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-23T19:12:48.907770Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-23T19:13:09.654Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22",
              "status": "affected",
              "version": "FW20",
              "versionType": "semver"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW22"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Quentin Kaiser from ONEKEY"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise."
            }
          ],
          "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-15T08:51:27.453Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-007/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-007",
        "defect": [
          "CERT@VDE#64422"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: WBM Command Injection in multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1698",
    "datePublished": "2023-05-15T08:51:27.453Z",
    "dateReserved": "2023-03-29T13:00:05.618Z",
    "dateUpdated": "2025-01-23T19:13:09.654Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3281 (GCVE-0-2022-3281)

Vulnerability from nvd – Published: 2022-10-17 08:20 – Updated: 2025-05-10 02:56
VLAI?
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
CWE
  • CWE-440 - Expected Behavior Violation
Assigner
Impacted products
Vendor Product Version
WAGO 750-81xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-8217/xxx-xxx Series PFC100/PFC200 Affected: 03.04.10(16) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO 750-82xx/xxx-xxx Series PFC100/PFC200 Affected: 03.01.07(13) , ≤ 03.10.08(22) (custom)
Create a notification for this product.
    WAGO Compact Controller CC100 Affected: 03.07.17(19) , ≤ 03.09.08(21) (custom)
Create a notification for this product.
    WAGO 762-4xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-5xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 762-6xxx Series Touch Panel 600 Affected: 03.01.07(13) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
    WAGO 752-8303/8000-002 Edge Controller Affected: 03.06.09(18) , ≤ 03.10.09(22) (custom)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3281",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:56:08.488527Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:56:32.932Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-81xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-8217/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.04.10(16)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-82xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.09.08(21)",
              "status": "affected",
              "version": "03.07.17(19)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-4xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-5xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-6xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "752-8303/8000-002 Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.06.09(18)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-440",
              "description": "CWE-440 Expected Behavior Violation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
        }
      ],
      "source": {
        "advisory": "VDE-2022-042",
        "defect": [
          "CERT@VDE#64236"
        ],
        "discovery": "INTERNAL"
      },
      "title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-3281",
    "datePublished": "2022-10-17T08:20:12.389Z",
    "dateReserved": "2022-09-23T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:56:32.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}