All the vulnerabilites related to WAGO - Edge Controller
cve-2023-1698
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "PFC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Quentin Kaiser from ONEKEY" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise." } ], "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-15T08:51:27.453Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" } ], "source": { "advisory": "VDE-2023-007", "defect": [ "CERT@VDE#64422" ], "discovery": "EXTERNAL" }, "title": "WAGO: WBM Command Injection in multiple products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2023-1698", "datePublished": "2023-05-15T08:51:27.453Z", "dateReserved": "2023-03-29T13:00:05.618Z", "dateUpdated": "2024-08-02T05:57:24.816Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4089
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:11.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW19", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW18", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PFC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PFC200", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Floris Hendriks and Jeroen Wijenbergh from Radboud University" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected." } ], "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "CWE-610 Externally Controlled Reference to a Resource in Another Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-17T06:00:28.908Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" } ], "source": { "advisory": "VDE-2023-046", "defect": [ "CERT@VDE#64532" ], "discovery": "EXTERNAL" }, "title": "WAGO: Multiple products vulnerable to local file inclusion", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2023-4089", "datePublished": "2023-10-17T06:00:28.908Z", "dateReserved": "2023-08-02T07:20:35.600Z", "dateUpdated": "2024-08-02T07:17:11.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202305-1415
Vulnerability from variot
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. compact controller 100 firmware, Edge Controller firmware, PFC100 firmware etc. WAGO The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202305-1415", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "touch panel 600 advanced", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "compact controller 100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "20" }, { "model": "pfc100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "23" }, { "model": "compact controller 100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "23" }, { "model": "pfc100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "20" }, { "model": "edge controller", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "pfc200", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "23" }, { "model": "pfc200", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "20" }, { "model": "touch panel 600 standard", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 marine", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "compact controller 100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 marine", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc200", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "edge controller", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 standard", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 advanced", "scope": null, "trust": 0.8, "vendor": "wago", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:edge_controller_firmware:22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-1698" } ] }, "cve": "CVE-2023-1698", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "info@cert.vde.com", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 3.9, "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 9.8, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2023-009971", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "info@cert.vde.com", "id": "CVE-2023-1698", "trust": 1.0, "value": "CRITICAL" }, { "author": "OTHER", "id": "JVNDB-2023-009971", "trust": 0.8, "value": "Critical" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. compact controller 100 firmware, Edge Controller firmware, PFC100 firmware etc. WAGO The product has OS A command injection vulnerability exists.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-1698" }, { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "VULMON", "id": "CVE-2023-1698" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-1698", "trust": 2.7 }, { "db": "CERT@VDE", "id": "VDE-2023-007", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2023-009971", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-1698", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-1698" }, { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "id": "VAR-202305-1415", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.65716723 }, "last_update_date": "2023-12-18T13:46:01.870000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.0 }, { "problemtype": "OS Command injection (CWE-78) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://cert.vde.com/en/advisories/vde-2023-007/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-1698" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/78.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-1698" }, { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-1698" }, { "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "db": "NVD", "id": "CVE-2023-1698" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-15T00:00:00", "db": "VULMON", "id": "CVE-2023-1698" }, { "date": "2023-12-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "date": "2023-05-15T09:15:09.510000", "db": "NVD", "id": "CVE-2023-1698" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-05-15T00:00:00", "db": "VULMON", "id": "CVE-2023-1698" }, { "date": "2023-12-07T05:39:00", "db": "JVNDB", "id": "JVNDB-2023-009971" }, { "date": "2023-05-26T17:09:45.837000", "db": "NVD", "id": "CVE-2023-1698" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0WAGO\u00a0 In the product \u00a0OS\u00a0 Command injection vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-009971" } ], "trust": 0.8 } }
var-202311-1670
Vulnerability from variot
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. compact controller 100 firmware, Edge Controller firmware, PFC100 firmware etc. WAGO There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202311-1670", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "pfc200", "scope": "lt", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 advanced", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "25" }, { "model": "pfc100", "scope": "lt", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "pfc100", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "pfc200", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "24" }, { "model": "compact controller 100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "25" }, { "model": "edge controller", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "25" }, { "model": "pfc200", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "pfc200", "scope": "eq", "trust": 1.0, "vendor": "wago", "version": "23" }, { "model": "touch panel 600 standard", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "25" }, { "model": "touch panel 600 marine", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "25" }, { "model": "touch panel 600 marine", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 standard", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "edge controller", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc200", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 advanced", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "compact controller 100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:22:patch_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "22", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:22:patch_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "25", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-3379" } ] }, "cve": "CVE-2023-3379", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "info@cert.vde.com", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 1.8, "impactScore": 3.4, "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "OTHER", "availabilityImpact": "Low", "baseScore": 5.3, "baseSeverity": "Medium", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2023-018600", "impactScore": null, "integrityImpact": "Low", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" } ], "severity": [ { "author": "info@cert.vde.com", "id": "CVE-2023-3379", "trust": 1.0, "value": "MEDIUM" }, { "author": "OTHER", "id": "JVNDB-2023-018600", "trust": 0.8, "value": "Medium" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. compact controller 100 firmware, Edge Controller firmware, PFC100 firmware etc. WAGO There are unspecified vulnerabilities in the product.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state", "sources": [ { "db": "NVD", "id": "CVE-2023-3379" }, { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "VULMON", "id": "CVE-2023-3379" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-3379", "trust": 2.7 }, { "db": "CERT@VDE", "id": "VDE-2023-015", "trust": 1.9 }, { "db": "JVNDB", "id": "JVNDB-2023-018600", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-3379", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-3379" }, { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "id": "VAR-202311-1670", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.65716723 }, "last_update_date": "2024-01-18T23:01:35.634000Z", "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://cert.vde.com/en/advisories/vde-2023-015/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-3379" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-3379" }, { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-3379" }, { "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "db": "NVD", "id": "CVE-2023-3379" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-20T00:00:00", "db": "VULMON", "id": "CVE-2023-3379" }, { "date": "2024-01-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "date": "2023-11-20T08:15:44.280000", "db": "NVD", "id": "CVE-2023-3379" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-11-20T00:00:00", "db": "VULMON", "id": "CVE-2023-3379" }, { "date": "2024-01-11T07:25:00", "db": "JVNDB", "id": "JVNDB-2023-018600" }, { "date": "2023-11-30T15:16:28.910000", "db": "NVD", "id": "CVE-2023-3379" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0WAGO\u00a0 Product vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-018600" } ], "trust": 0.8 } }
var-202310-0385
Vulnerability from variot
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected. WAGO The following vulnerabilities exist in multiple products provided by . * Externally controllable reference to another region resource (CWE-610) - CVE-2023-4089If the vulnerability is exploited, it may be affected as follows
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202310-0385", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "touch panel 600 advanced", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "compact controller 100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "19" }, { "model": "pfc200", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "pfc100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "touch panel 600 advanced", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "touch panel 600 standard", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "compact controller 100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "edge controller", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "pfc200", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "touch panel 600 marine", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "touch panel 600 marine", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "pfc100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "edge controller", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "18" }, { "model": "touch panel 600 standard", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "26" }, { "model": "edge controller", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 advanced", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 standard", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc200", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "compact controller cc100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "touch panel 600 marine", "scope": null, "trust": 0.8, "vendor": "wago", "version": null }, { "model": "pfc100", "scope": null, "trust": 0.8, "vendor": "wago", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "19", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "18", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2023-4089" } ] }, "cve": "CVE-2023-4089", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "info@cert.vde.com", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "exploitabilityScore": 1.2, "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "OTHER", "availabilityImpact": "None", "baseScore": 2.7, "baseSeverity": "Low", "confidentialityImpact": "Low", "exploitabilityScore": null, "id": "JVNDB-2023-007590", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "High", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "info@cert.vde.com", "id": "CVE-2023-4089", "trust": 1.0, "value": "LOW" }, { "author": "OTHER", "id": "JVNDB-2023-007590", "trust": 0.8, "value": "Low" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected. WAGO The following vulnerabilities exist in multiple products provided by . * Externally controllable reference to another region resource (CWE-610) - CVE-2023-4089If the vulnerability is exploited, it may be affected as follows", "sources": [ { "db": "NVD", "id": "CVE-2023-4089" }, { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "VULMON", "id": "CVE-2023-4089" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2023-4089", "trust": 2.7 }, { "db": "CERT@VDE", "id": "VDE-2023-046", "trust": 1.9 }, { "db": "JVN", "id": "JVNVU96020889", "trust": 0.8 }, { "db": "ICS CERT", "id": "ICSA-23-325-01", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2023-007590", "trust": 0.8 }, { "db": "VULMON", "id": "CVE-2023-4089", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4089" }, { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "id": "VAR-202310-0385", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.65716723 }, "last_update_date": "2023-12-18T12:33:31.559000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "WAGO\u00a0Global\u00a0|\u00a0Reliable\u00a0Solutions\u00a0for\u00a0Many\u00a0Sectors\u00a0and\u00a0Industories", "trust": 0.8, "url": "https://www.wago.com/global/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-007590" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-610", "trust": 1.0 }, { "problemtype": "Externally controllable reference to another region resource (CWE-610) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.1, "url": "https://cert.vde.com/en/advisories/vde-2023-046/" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu96020889/index.html" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2023-4089" }, { "trust": 0.8, "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-325-01" }, { "trust": 0.8, "url": "https://cert.vde.com/de/advisories/vde-2023-046/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/610.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2023-4089" }, { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2023-4089" }, { "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "db": "NVD", "id": "CVE-2023-4089" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-17T00:00:00", "db": "VULMON", "id": "CVE-2023-4089" }, { "date": "2023-11-24T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "date": "2023-10-17T07:15:10.090000", "db": "NVD", "id": "CVE-2023-4089" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-10-17T00:00:00", "db": "VULMON", "id": "CVE-2023-4089" }, { "date": "2023-11-24T04:24:00", "db": "JVNDB", "id": "JVNDB-2023-007590" }, { "date": "2023-10-24T18:00:38.507000", "db": "NVD", "id": "CVE-2023-4089" } ] }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0WAGO\u00a0 Vulnerability of external controllable references to other domain resources in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-007590" } ], "trust": 0.8 } }
var-202301-1424
Vulnerability from variot
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull. plural WAGO The product contains a lack of authentication vulnerability for critical functionality.Information may be obtained
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202301-1424", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cc100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 advanced", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "pfc100", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "pfc200", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "edge controller", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 standard", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "pfc200", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "edge controller", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "touch panel 600 standard", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 marine", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "cc100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "pfc100", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "touch panel 600 advanced", "scope": "lte", "trust": 1.0, "vendor": "wago", "version": "22" }, { "model": "touch panel 600 marine", "scope": "gte", "trust": 1.0, "vendor": "wago", "version": "16" }, { "model": "touch panel 600 standard", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "pfc100", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "touch panel 600 advanced", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "compact controller cc100", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "edge controller", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "touch panel 600 marine", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null }, { "model": "pfc200", "scope": null, "trust": 0.8, "vendor": "\u30ef\u30b4\u30b8\u30e3\u30d1\u30f3\u682a\u5f0f\u4f1a\u793e", "version": null } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:cc100_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:cc100:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2022-3738" } ] }, "cve": "CVE-2022-3738", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "HIGH", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.2, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, { "attackComplexity": "High", "attackVector": "Network", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.9, "baseSeverity": "Medium", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-3738", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2022-3738", "trust": 1.8, "value": "MEDIUM" }, { "author": "info@cert.vde.com", "id": "CVE-2022-3738", "trust": 1.0, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202301-1507", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull. plural WAGO The product contains a lack of authentication vulnerability for critical functionality.Information may be obtained", "sources": [ { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "VULMON", "id": "CVE-2022-3738" } ], "trust": 1.71 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-3738", "trust": 3.3 }, { "db": "CERT@VDE", "id": "VDE-2022-054", "trust": 2.5 }, { "db": "JVNDB", "id": "JVNDB-2023-001947", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-202301-1507", "trust": 0.6 }, { "db": "VULMON", "id": "CVE-2022-3738", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-3738" }, { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "id": "VAR-202301-1424", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.65716723 }, "last_update_date": "2023-12-18T12:15:03.973000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.wago.com/us/" }, { "title": "WAGO Fixes for access control error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=222117" }, { "title": "", "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-3738 " } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-3738" }, { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-306", "trust": 1.0 }, { "problemtype": "Lack of authentication for critical features (CWE-306) [ others ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "https://cert.vde.com/en/advisories/vde-2022-054/" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-3738" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-3738/" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/306.html" }, { "trust": 0.1, "url": "https://github.com/live-hack-cve/cve-2022-3738" }, { "trust": 0.1, "url": "https://nvd.nist.gov" } ], "sources": [ { "db": "VULMON", "id": "CVE-2022-3738" }, { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2022-3738" }, { "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "db": "NVD", "id": "CVE-2022-3738" }, { "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2022-3738" }, { "date": "2023-05-25T00:00:00", "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "date": "2023-01-19T12:15:11.213000", "db": "NVD", "id": "CVE-2022-3738" }, { "date": "2023-01-19T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2023-01-19T00:00:00", "db": "VULMON", "id": "CVE-2022-3738" }, { "date": "2023-05-25T06:27:00", "db": "JVNDB", "id": "JVNDB-2023-001947" }, { "date": "2023-11-07T10:15:07.787000", "db": "NVD", "id": "CVE-2022-3738" }, { "date": "2023-01-28T00:00:00", "db": "CNNVD", "id": "CNNVD-202301-1507" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-1507" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "plural \u00a0WAGO\u00a0 Vulnerability related to lack of authentication for critical functions in the product", "sources": [ { "db": "JVNDB", "id": "JVNDB-2023-001947" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access control error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202301-1507" } ], "trust": 0.6 } }