All the vulnerabilites related to WAGO - PFC100 (750-81xx/xxx-xxx)
cve-2022-45140
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
WAGO: Missing Authentication for Critical Function
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise." } ], "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:39.448Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Missing Authentication for Critical Function ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45140", "datePublished": "2023-02-27T14:36:39.448Z", "dateReserved": "2022-11-10T09:46:59.080Z", "dateUpdated": "2024-08-03T14:09:55.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45139
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
WAGO: Origin validation error through CORS misconfiguration
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality." } ], "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:32.016Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Origin validation error through CORS misconfiguration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45139", "datePublished": "2023-02-27T14:36:32.016Z", "dateReserved": "2022-11-10T09:46:59.080Z", "dateUpdated": "2024-08-03T14:09:55.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45137
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
WAGO: Reflective Cross-Site Scripting
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability." } ], "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:03.411Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Reflective Cross-Site Scripting", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45137", "datePublished": "2023-02-27T14:36:03.411Z", "dateReserved": "2022-11-10T09:46:59.079Z", "dateUpdated": "2024-08-03T14:09:56.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45138
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
WAGO: Missing Authentication for Critical Function
References
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device." } ], "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:20.474Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Missing Authentication for Critical Function", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45138", "datePublished": "2023-02-27T14:36:20.474Z", "dateReserved": "2022-11-10T09:46:59.079Z", "dateUpdated": "2024-08-03T14:09:55.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }