Search criteria

90 vulnerabilities by wago

CVE-2025-41732 (GCVE-0-2025-41732)

Vulnerability from cvelistv5 – Published: 2025-12-10 11:04 – Updated: 2025-12-11 09:12
VLAI?
Summary
An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_cookie() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
WAGO Indsutrial-Managed-Switches Affected: 0.0.0 , < 02.64 (semver)
Create a notification for this product.
Credits
Daniel Hulliger from The Cyber-Defence Campus of armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41732",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-10T14:10:40.987887Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-10T14:11:15.055Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Indsutrial-Managed-Switches",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "02.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from The Cyber-Defence Campus of armasuisse S+T"
        }
      ],
      "datePublic": "2025-12-10T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_cookie() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_cookie() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-11T09:12:08.780Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-095"
        }
      ],
      "source": {
        "advisory": "VDE-2025-095",
        "defect": [
          "CERT@VDE#641880"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Stack-based buffer overflow via unsafe sscanf in check_cookie()",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41732",
    "datePublished": "2025-12-10T11:04:37.214Z",
    "dateReserved": "2025-04-16T11:17:48.319Z",
    "dateUpdated": "2025-12-11T09:12:08.780Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41730 (GCVE-0-2025-41730)

Vulnerability from cvelistv5 – Published: 2025-12-10 11:04 – Updated: 2025-12-11 09:12
VLAI?
Summary
An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.
CWE
  • CWE-121 - Stack-based Buffer Overflow
Assigner
Impacted products
Vendor Product Version
WAGO Indsutrial-Managed-Switches Affected: 0.0.0 , < 02.64 (semver)
Create a notification for this product.
Credits
Daniel Hulliger from The Cyber-Defence Campus of armasuisse S+T
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41730",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-12-10T16:41:05.184172Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-12-10T16:43:28.052Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Indsutrial-Managed-Switches",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "02.64",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel Hulliger from The Cyber-Defence Campus of armasuisse S+T"
        }
      ],
      "datePublic": "2025-12-10T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_account() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-12-11T09:12:31.704Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-095"
        }
      ],
      "source": {
        "advisory": "VDE-2025-095",
        "defect": [
          "CERT@VDE#641880"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Stack-based buffer overflow via unsafe sscanf in check_account()",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41730",
    "datePublished": "2025-12-10T11:04:13.112Z",
    "dateReserved": "2025-04-16T11:17:48.319Z",
    "dateUpdated": "2025-12-11T09:12:31.704Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-41716 (GCVE-0-2025-41716)

Vulnerability from cvelistv5 – Published: 2025-09-24 09:04 – Updated: 2025-09-24 13:03
VLAI?
Summary
The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO Solution Builder Affected: 0.0.0 , < 2.3.3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41716",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-24T13:03:29.670633Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-24T13:03:53.265Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Solution Builder",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "2.3.3",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function.\u003cbr\u003e"
            }
          ],
          "value": "The web application allows an unauthenticated remote attacker to learn information about existing user accounts with their corresponding role due to missing authentication for critical function."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-24T09:04:33.971Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-087"
        }
      ],
      "source": {
        "advisory": "VDE-2025-087",
        "defect": [
          "CERT@VDE#641858"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unauthenticated User Enumeration via Missing Authentication",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41716",
    "datePublished": "2025-09-24T09:04:33.971Z",
    "dateReserved": "2025-04-16T11:17:48.313Z",
    "dateUpdated": "2025-09-24T13:03:53.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41715 (GCVE-0-2025-41715)

Vulnerability from cvelistv5 – Published: 2025-09-24 09:04 – Updated: 2025-09-24 13:07
VLAI?
Summary
The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO Device Sphere Affected: 0.0.0 , < 1.1.0 (semver)
Create a notification for this product.
    WAGO Solution Builder Affected: 0.0.0 , < 2.3.3 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41715",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-24T13:07:23.769369Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-24T13:07:30.391Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Device Sphere",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.1.0",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Solution Builder",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "2.3.3",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eThe database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it.\u003c/p\u003e"
            }
          ],
          "value": "The database for the web application is exposed without authentication, allowing an unauthenticated remote attacker to gain unauthorized access and potentially compromise it."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-24T09:04:22.835Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-087"
        }
      ],
      "source": {
        "advisory": "VDE-2025-087",
        "defect": [
          "CERT@VDE#641858"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Missing Authentication for Database Access in Web Application",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41715",
    "datePublished": "2025-09-24T09:04:22.835Z",
    "dateReserved": "2025-04-16T11:17:48.312Z",
    "dateUpdated": "2025-09-24T13:07:30.391Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41713 (GCVE-0-2025-41713)

Vulnerability from cvelistv5 – Published: 2025-09-15 08:00 – Updated: 2025-09-15 15:23
VLAI?
Summary
During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration.
CWE
  • CWE-1188 - Insecure Default Initialization of Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9301 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9301 HW rev. &lt;082100 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9301/K000-0005 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9301/K000-0005 HW rev. &lt;082100 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9401 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9401 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9402 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9402/0000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9402/0000-0001 HW rev. &lt;052800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9402 HW rev. &lt;032800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO CC100 0751-9403 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO CC100 0751-9403 HW rev. &lt;022800 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 HW rev. 32500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4101 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4101 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4102 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4102 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4104 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4104 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0001 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4201/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4301/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4301/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4302/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4302/8000-0002 HW rev. &lt;072500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4303/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4303/8000-0002 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4304/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4304/8000-0002 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4305/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4305/8000-0002 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0001 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0002 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-4306/8000-0002 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5201/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5201/8000-0001 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5203/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5203/8000-0001 HW rev. &lt;062500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5204/8000-0001 HW rev. &lt;052500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5205/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5205/8000-0001 HW rev. &lt;032500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
    WAGO TP600 0762-5206/8000-0001 Affected: 0 , < HW (semver)
Create a notification for this product.
    WAGO TP600 0762-5206/8000-0001 HW rev. &lt;042500 Affected: 0 , < 04.08.05 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41713",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-15T15:23:05.302247Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-15T15:23:17.088Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301 HW rev. \u0026lt;082100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301/K000-0005",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9301/K000-0005 HW rev. \u0026lt;082100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9401",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9401 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402/0000-0001 HW rev. \u0026lt;052800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9402 HW rev. \u0026lt;032800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9403",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9403 HW rev. \u0026lt;022800",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002 HW rev. 32500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4101",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4101 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4102",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4102 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4104",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4104 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0001 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4201/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4301/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4301/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4302/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4302/8000-0002 HW rev. \u0026lt;072500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4303/8000-0002 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4304/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4304/8000-0002 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4305/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4305/8000-0002 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0001 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-4306/8000-0002 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5201/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5201/8000-0001 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5203/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5203/8000-0001 HW rev. \u0026lt;062500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5204/8000-0001 HW rev. \u0026lt;052500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5205/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5205/8000-0001 HW rev. \u0026lt;032500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5206/8000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "HW",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-5206/8000-0001 HW rev. \u0026lt;042500",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.08.05",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration."
            }
          ],
          "value": "During a short time frame while the device is booting an unauthenticated remote attacker can send traffic to unauthorized networks due to the switch operating in an undefined state until a CPU-induced reset allows proper configuration."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188 Insecure Default Initialization of Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-15T08:00:50.241Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-083"
        },
        {
          "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-083.json"
        }
      ],
      "source": {
        "advisory": "VDE-2025-083",
        "defect": [
          "CERT@VDE#641852"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Vulnerability in hardware switch circuit",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41713",
    "datePublished": "2025-09-15T08:00:50.241Z",
    "dateReserved": "2025-04-16T11:17:48.311Z",
    "dateUpdated": "2025-09-15T15:23:17.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41664 (GCVE-0-2025-41664)

Vulnerability from cvelistv5 – Published: 2025-09-08 06:39 – Updated: 2025-09-08 16:03
VLAI?
Summary
A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41664",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-09-08T16:02:34.291705Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-09-08T16:03:08.365Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/0040-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/K013-1080",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0362/K019-7576",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0363",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0363/0040-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0364/0040-0010",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0365/0040-0010",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Coupler 0750-0366",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.\u003cbr\u003e"
            }
          ],
          "value": "A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-09-08T06:39:19.566Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/de/advisories/VDE-2025-048"
        }
      ],
      "source": {
        "advisory": "VDE-2025-048",
        "defect": [
          "CERT@VDE#641798"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Improper Permission Handling Enables Unauthorized Access to Firmware and Certificates",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41664",
    "datePublished": "2025-09-08T06:39:19.566Z",
    "dateReserved": "2025-04-16T11:17:48.307Z",
    "dateUpdated": "2025-09-08T16:03:08.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-41672 (GCVE-0-2025-41672)

Vulnerability from cvelistv5 – Published: 2025-07-07 06:17 – Updated: 2025-07-07 16:34
VLAI?
Summary
A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices.
CWE
Assigner
Impacted products
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-41672",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-07-07T16:27:29.386240Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-07-07T16:34:52.794Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Wago Device Sphere",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "1.0.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices."
            }
          ],
          "value": "A remote unauthenticated attacker may use default certificates to generate JWT Tokens and gain full access to the tool and all connected devices."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 10,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1188",
              "description": "CWE-1188",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-07-07T06:17:18.988Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-057"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2025/vde-2025-057.json"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Vulnerability in WAGO Device Sphere",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-41672",
    "datePublished": "2025-07-07T06:17:18.988Z",
    "dateReserved": "2025-04-16T11:17:48.308Z",
    "dateUpdated": "2025-07-07T16:34:52.794Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-25265 (GCVE-0-2025-25265)

Vulnerability from cvelistv5 – Published: 2025-06-16 09:46 – Updated: 2025-11-21 11:38
VLAI?
Summary
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system’s file structure.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25265",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T18:12:43.011626Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T18:13:49.552Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "WAGO CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system\u2019s file structure.\u003cbr\u003e"
            }
          ],
          "value": "A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows a high privileged remote attacker to read files from the system\u2019s file structure."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-21T11:38:18.852Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-018/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-018",
        "defect": [
          "CERT@VDE#641748"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Unauthenticated File Read via Web Interface",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-25265",
    "datePublished": "2025-06-16T09:46:13.998Z",
    "dateReserved": "2025-02-06T12:30:08.318Z",
    "dateUpdated": "2025-11-21T11:38:18.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-25264 (GCVE-0-2025-25264)

Vulnerability from cvelistv5 – Published: 2025-06-16 09:45 – Updated: 2025-11-21 11:36
VLAI?
Summary
An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system.
CWE
  • CWE-942 - Permissive Cross-domain Policy with Untrusted Domains
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0.0.0 , < 04.07.01 (70 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , < 3.10.11 (FW22 Patch 2) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (FW29) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , < 04.07.01 (70) (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-25264",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-16T18:15:48.127204Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-16T18:15:58.245Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11 (FW22 Patch 2)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (FW29)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can trick an admin to visit a website containing malicious java script code. The current overly permissive CORS policy allows the attacker to obtain any files from the file system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-942",
              "description": "CWE-942 Permissive Cross-domain Policy with Untrusted Domains",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-21T11:36:54.281Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://certvde.com/en/advisories/VDE-2025-018/"
        }
      ],
      "source": {
        "advisory": "VDE-2025-018",
        "defect": [
          "CERT@VDE#641748"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Overly Permissive CORS Policy in WAGO Device Manager",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-25264",
    "datePublished": "2025-06-16T09:45:31.613Z",
    "dateReserved": "2025-02-06T12:30:08.317Z",
    "dateUpdated": "2025-11-21T11:36:54.281Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2025-1235 (GCVE-0-2025-1235)

Vulnerability from cvelistv5 – Published: 2025-06-02 06:23 – Updated: 2025-06-02 17:03
VLAI?
Summary
A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.
CWE
  • CWE-190 - Integer Overflow or Wraparound
Assigner
Credits
Marcus Kramhöller from Noris Automatio GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-1235",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-06-02T17:02:26.990253Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-02T17:03:08.740Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-0303",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1305",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1305/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1505",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fully Managed Switches 0852-1505/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1812",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1812/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0000-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1813/0010-0001",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1816",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Lean Managed Switches 0852-1816/0010-0000",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "all"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Marcus Kramh\u00f6ller from Noris Automatio GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970."
            }
          ],
          "value": "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-02T06:23:19.261Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-020"
        }
      ],
      "source": {
        "advisory": "VDE-2025-020",
        "defect": [
          "CERT@VDE#641749"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Switches affected by year 2k38 problem",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-1235",
    "datePublished": "2025-06-02T06:23:19.261Z",
    "dateReserved": "2025-02-11T15:46:42.856Z",
    "dateUpdated": "2025-06-02T17:03:08.740Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-0101 (GCVE-0-2025-0101)

Vulnerability from cvelistv5 – Published: 2025-04-16 07:29 – Updated: 2025-04-16 14:40
VLAI?
Summary
A low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart.
CWE
  • CWE-190 - Integer Overflow or Wraparound
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 03.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 03.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
Credits
Marcus Kramhöller from Noris Automatio GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-0101",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-16T14:40:07.343717Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-16T14:40:37.827Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "03.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "03.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WAGO Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Marcus Kramh\u00f6ller from Noris Automatio GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eA low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart.\u003c/p\u003e"
            }
          ],
          "value": "A low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-190",
              "description": "CWE-190 Integer Overflow or Wraparound",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-04-16T07:29:06.441Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-007"
        }
      ],
      "source": {
        "advisory": "VDE-2025-007",
        "defect": [
          "CERT@VDE#641734"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Year 2038 problem",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2025-0101",
    "datePublished": "2025-04-16T07:29:06.441Z",
    "dateReserved": "2024-12-19T10:35:03.865Z",
    "dateUpdated": "2025-04-16T14:40:37.827Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-12650 (GCVE-0-2024-12650)

Vulnerability from cvelistv5 – Published: 2025-03-05 11:46 – Updated: 2025-03-05 14:12
VLAI?
Summary
An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.
CWE
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO CC100 0751-9x01 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 3.10.11 (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0 , < 04.07.01 (semver)
Create a notification for this product.
Credits
Gabriele Quagliarella from Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-12650",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-05T14:11:34.419639Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-05T14:12:02.004Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "3.10.11",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "04.07.01",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Gabriele Quagliarella from Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eAn attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications.\u003c/p\u003e"
            }
          ],
          "value": "An attacker with low privileges can manipulate the requested memory size, causing the application to use an invalid memory area. This could lead to a crash of the application but it does not affected other applications."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-252",
              "description": "CWE-252 Unchecked Return Value",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-05T11:46:15.486Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2025-004"
        }
      ],
      "source": {
        "advisory": "VDE-2025-004",
        "defect": [
          "CERT@VDE#641731"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "Wago: Vulnerability in libwagosnmp",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-12650",
    "datePublished": "2025-03-05T11:46:15.486Z",
    "dateReserved": "2024-12-16T07:37:06.620Z",
    "dateUpdated": "2025-03-05T14:12:02.004Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-25108 (GCVE-0-2018-25108)

Vulnerability from cvelistv5 – Published: 2025-01-16 10:17 – Updated: 2025-01-16 14:13
VLAI?
Summary
An unauthenticated remote attacker can cause a DoS in the controller due to uncontrolled resource consumption.
CWE
  • CWE-770 - Allocation of Resources Without Limits or Throttling
Assigner
Impacted products
Vendor Product Version
WAGO 750-8100 (Controller PFC100) Affected: 0 , ≤ 02.05.23(08) (semver)
Create a notification for this product.
    WAGO 750-831 (Controller BACnet/IP) Affected: 0 , ≤ 01.02.29(09) (semver)
Create a notification for this product.
    WAGO 750-880 (Controller ETH) Affected: 0 , ≤ 01.07.03(10) (semver)
Create a notification for this product.
    WAGO 750-889 (Controller KNX IP) Affected: 0 , ≤ 01.07.13(10) (semver)
Create a notification for this product.
Credits
Matthias Niedermaier (Hochschule Augsburg) Jan-Ole Malchow (Freie Universität Berlin) Florian Fischer (Hochschule Augsburg)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-25108",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-16T14:12:32.309251Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-16T14:13:05.340Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8100 (Controller PFC100)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "02.05.23(08)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831 (Controller BACnet/IP)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.02.29(09)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880 (Controller ETH)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.07.03(10)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889 (Controller KNX IP)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "01.07.13(10)",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Matthias Niedermaier (Hochschule Augsburg)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Jan-Ole Malchow (Freie Universita\u0308t Berlin)"
        },
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Florian Fischer (Hochschule Augsburg)"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can cause a DoS in the controller due to\u0026nbsp;uncontrolled resource consumption.\u003cbr\u003e"
            }
          ],
          "value": "An unauthenticated remote attacker can cause a DoS in the controller due to\u00a0uncontrolled resource consumption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-16T10:17:21.149Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2018-013"
        }
      ],
      "source": {
        "advisory": "VDE-2018-013",
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Denial of service in 750-8xx controller due to uncontrolled resource consumption",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2018-25108",
    "datePublished": "2025-01-16T10:17:21.149Z",
    "dateReserved": "2025-01-15T15:08:51.058Z",
    "dateUpdated": "2025-01-16T14:13:05.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41974 (GCVE-0-2024-41974)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:05 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41974",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:12:08.030082Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.186Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may modify the BACNet service properties due to incorrect permission assignment for critical resources which may lead to a DoS limited to BACNet communication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:48:08.506Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: BACNet Service Property Modification Due to Permission Misconfiguration in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41974",
    "datePublished": "2024-11-18T09:05:32.043Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.186Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41973 (GCVE-0-2024-41973)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:05 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker can specify an arbitrary file on the filesystem which may lead to an arbitrary file writes with root privileges.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41973",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:13:35.584257Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.344Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can\u0026nbsp;specify an arbitrary file on the filesystem which\u0026nbsp;may lead to an arbitrary file writes with root privileges.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can\u00a0specify an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file writes with root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35 Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:45:53.917Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Remote Arbitrary File Write with Root Privileges in multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41973",
    "datePublished": "2024-11-18T09:05:15.892Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.344Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41972 (GCVE-0-2024-41972)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker can overwrite an arbitrary file on the filesystem which may lead to an arbitrary file read with root privileges.
CWE
  • CWE-35 - Path Traversal: '.../...//'
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41972",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T14:53:48.536484Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.494Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can\u0026nbsp;overwrite an arbitrary file on the filesystem which\u0026nbsp;may lead to an arbitrary file read with root privileges.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can\u00a0overwrite an arbitrary file on the filesystem which\u00a0may lead to an arbitrary file read with root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-35",
              "description": "CWE-35 Path Traversal: \u0027.../...//\u0027",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:43:14.234Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Arbitrary File Overwrite Leading to Privileged File Read in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41972",
    "datePublished": "2024-11-18T09:04:56.284Z",
    "dateReserved": "2024-07-25T09:07:31.466Z",
    "dateUpdated": "2025-08-27T21:33:03.494Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41971 (GCVE-0-2024-41971)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41971",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:19:07.273651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker can overwrite an arbitrary file on the filesystem leading to a DoS and data loss."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:39:34.318Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Arbitrary File Overwrite in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41971",
    "datePublished": "2024-11-18T09:04:42.052Z",
    "dateReserved": "2024-07-25T09:07:31.465Z",
    "dateUpdated": "2025-08-27T21:33:03.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41970 (GCVE-0-2024-41970)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.
CWE
  • CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 5.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41970",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:17:05.082537Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.735Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may gain access to forbidden diagnostic data due to incorrect permission assignment for critical resources."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T08:35:53.240Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Unauthorized Diagnostic Data Exposure in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41970",
    "datePublished": "2024-11-18T09:04:27.334Z",
    "dateReserved": "2024-07-25T09:07:31.465Z",
    "dateUpdated": "2025-08-27T21:33:03.735Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41969 (GCVE-0-2024-41969)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:04 – Updated: 2025-01-30 09:21
VLAI?
Summary
A low privileged remote attacker may modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-41969",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-09T22:09:24.613269Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-10T16:59:37.246Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker may\u0026nbsp;modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS.\u0026nbsp;\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker may\u00a0modify the configuration of the CODESYS V3 service through a missing authentication vulnerability which could lead to full system access and/or DoS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:21:40.910Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: CODESYS V3 Configuration Authentication Bypass in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41969",
    "datePublished": "2024-11-18T09:04:13.691Z",
    "dateReserved": "2024-07-25T09:07:31.464Z",
    "dateUpdated": "2025-01-30T09:21:40.910Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41967 (GCVE-0-2024-41967)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:03 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41967",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-18T15:22:03.669949Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.997Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker\u0026nbsp;may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack.\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker\u00a0may modify the boot mode configuration setup of the device, leading to modification of the firmware upgrade process or a denial-of-service attack."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:19:19.853Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Boot Mode Manipulation in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41967",
    "datePublished": "2024-11-18T09:03:57.513Z",
    "dateReserved": "2024-07-25T09:07:31.463Z",
    "dateUpdated": "2025-08-27T21:33:03.997Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-41968 (GCVE-0-2024-41968)

Vulnerability from cvelistv5 – Published: 2024-11-18 09:03 – Updated: 2025-08-27 21:33
VLAI?
Summary
A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.
CWE
  • CWE-306 - Missing Authentication for Critical Function
Assigner
Impacted products
Vendor Product Version
WAGO CC100 0751-9x01 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G2 0750-811x-xxxx-xxxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC200 G2 750-821x-xxx-xxx Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-420x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-430x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-520x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-530x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-620x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO TP600 0762-630x/8000-000x Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO Edge Controller 0752-8303/8000-0002 Affected: 0.0.0 , ≤ 4.5.10 (FW27) (semver)
Create a notification for this product.
    WAGO PFC100 G1 0750-810x/xxxx-xxxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 750-820x-xxx-xxx Affected: 0.0.0 , ≤ 3.10.10 (FW22 Patch 1) (semver)
Create a notification for this product.
    WAGO PFC200 G1 0750-820x/xxx-xxx Affected: 0.0.0 , ≤ 03.03.08 (80) (semver)
Create a notification for this product.
    WAGO PFC200 G2 0750-821x/xxx-xxx Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.03.03 (72) (semver)
Create a notification for this product.
    WAGO CC100 0751/9x01 Affected: 0.0.0 , ≤ 04.04.03 (70) (semver)
Create a notification for this product.
Credits
Diego Giubertoni Nozomi Networks
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2024-41968",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-19T14:56:16.336634Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-27T21:33:03.869Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751-9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G2 0750-811x-xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 750-821x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-420x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-430x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-520x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-530x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-620x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "TP600 0762-630x/8000-000x",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller 0752-8303/8000-0002",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "4.5.10 (FW27)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 G1 0750-810x/xxxx-xxxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 750-820x-xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "3.10.10 (FW22 Patch 1)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G1 0750-820x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.03.08 (80)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 G2 0750-821x/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.03.03 (72)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "CC100 0751/9x01",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "04.04.03 (70)",
              "status": "affected",
              "version": "0.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Diego Giubertoni"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Nozomi Networks"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS.\u0026nbsp;\u003cbr\u003e"
            }
          ],
          "value": "A low privileged remote attacker may modify the docker settings setup of the device, leading to a limited DoS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-01-30T09:20:17.138Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2024-047"
        }
      ],
      "source": {
        "advisory": "VDE-2024-047",
        "defect": [
          "CERT@VDE#641658"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Docker Settings Manipulation in Multiple Devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2024-41968",
    "datePublished": "2024-11-18T09:03:20.948Z",
    "dateReserved": "2024-07-25T09:07:31.463Z",
    "dateUpdated": "2025-08-27T21:33:03.869Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-25090 (GCVE-0-2018-25090)

Vulnerability from cvelistv5 – Published: 2024-03-13 08:32 – Updated: 2024-08-05 15:22
VLAI?
Summary
An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required. This leads to a limited impact of confidentiality and integrity but no impact of availability.
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T12:33:48.504Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2018-25090",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-05T15:21:55.909544Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:22:05.933Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet/IP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet MS/TP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fieldbus Coupler Ethernet 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required.\u0026nbsp;This leads to a limited impact of confidentiality and integrity but no impact of availability."
            }
          ],
          "value": "An unauthenticated remote attacker can use an XSS attack due to improper neutralization of input during web page generation. User interaction is required.\u00a0This leads to a limited impact of confidentiality and integrity but no impact of availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-13T08:32:17.180Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-039",
        "defect": [
          "CERT@VDE#64546"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Wago: Improper Neutralization of Input During Web Page Generation in multiple devices",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2018-25090",
    "datePublished": "2024-03-13T08:32:17.180Z",
    "dateReserved": "2023-09-14T13:00:21.075Z",
    "dateUpdated": "2024-08-05T15:22:05.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2015-10123 (GCVE-0-2015-10123)

Vulnerability from cvelistv5 – Published: 2024-03-13 08:31 – Updated: 2024-10-23 09:40
VLAI?
Summary
An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device.
CWE
  • CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T08:58:26.532Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:wago:750-352_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-352_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-831_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-829_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-852_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-880_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-881_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-882_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-885_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-889_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:wago:750-884_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "750-884_firmware",
            "vendor": "wago",
            "versions": [
              {
                "lessThanOrEqual": "FW13",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2015-10123",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-06T18:34:04.204030Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:37:09.871Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet/IP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Controller BACnet MS/TP",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Ethernet Controller 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Fieldbus Coupler Ethernet 3rd Generation",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW13",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device.\u003cbr\u003e"
            }
          ],
          "value": "An unautheticated remote attacker could send specifically crafted packets to a affected device. If an authenticated user then views that data in a specific page of the web-based management a buffer overflow will be triggered to gain full access of the device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-23T09:40:12.408Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-039/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-039",
        "defect": [
          "CERT@VDE#64546"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "Wago: Buffer Copy without Checking Size of Input in wbm of multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2015-10123",
    "datePublished": "2024-03-13T08:31:55.341Z",
    "dateReserved": "2023-09-14T13:00:03.904Z",
    "dateUpdated": "2024-10-23T09:40:12.408Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5188 (GCVE-0-2023-5188)

Vulnerability from cvelistv5 – Published: 2023-12-05 07:19 – Updated: 2024-08-02 07:52
VLAI?
Summary
The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device.
CWE
  • CWE-20 - Improper Input Validation
Assigner
Impacted products
Credits
Sofia Pisani
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:52:07.789Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-044/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Telecontrol Configurator",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "*"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "WagoAppRTU",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.4.6.0",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Sofia Pisani"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device."
            }
          ],
          "value": "The MMS Interpreter of WagoAppRTU in versions below 1.4.6.0 which is used by the WAGO Telecontrol Configurator is vulnerable to malformed packets. An remote unauthenticated attacker could send specifically crafted packets that lead to a denial-of-service condition until restart of the affected device."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-14T14:09:31.201Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-044/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-044",
        "defect": [
          "CERT@VDE#64591"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO Improper Input Validation in IEC61850 Server / Telecontrol",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-5188",
    "datePublished": "2023-12-05T07:19:08.528Z",
    "dateReserved": "2023-09-26T05:25:11.663Z",
    "dateUpdated": "2024-08-02T07:52:07.789Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4149 (GCVE-0-2023-4149)

Vulnerability from cvelistv5 – Published: 2023-11-21 07:00 – Updated: 2024-08-02 07:17
VLAI?
Summary
A vulnerability in the web-based management allows an unauthenticated remote attacker to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-based management.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
Credits
INTILION AG GAI NetConsult
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:12.285Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-037"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Industrial Managed Switch (0852-0602)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.0.6.S0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Industrial Managed Switch (0852-0603)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.0.6.S0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Industrial Managed Switch (0852-1605)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "1.2.5.S0",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "INTILION AG"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "GAI NetConsult"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A vulnerability in the web-based management allows an unauthenticated remote attacker to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-based management."
            }
          ],
          "value": "A vulnerability in the web-based management allows an unauthenticated remote attacker to inject arbitrary system commands and gain full system control. Those commands are executed with root privileges. The vulnerability is located in the user request handling of the web-based management."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-21T07:00:25.240Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-037"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#64578"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: OS Command Injection Vulnerability in Managed Switch",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-4149",
    "datePublished": "2023-11-21T07:00:25.240Z",
    "dateReserved": "2023-08-04T08:15:12.564Z",
    "dateUpdated": "2024-08-02T07:17:12.285Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-3379 (GCVE-0-2023-3379)

Vulnerability from cvelistv5 – Published: 2023-11-20 07:23 – Updated: 2024-10-02 05:34
VLAI?
Summary
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
CWE
  • CWE-863 - Incorrect Authorization
Assigner
Credits
Panagiotis Bellonias from Secura
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T06:55:03.365Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-015/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller 100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 (750-810x/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22 Patch 1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-820x/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-821x/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW22 Patch 1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW25",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Panagiotis Bellonias from Secura"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker  to change the passwords of other non-admin users and thus to escalate non-root privileges."
            }
          ],
          "value": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker  to change the passwords of other non-admin users and thus to escalate non-root privileges."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-863",
              "description": "CWE-863 Incorrect Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:34:25.860Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-015/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-015",
        "defect": [
          "CERT@VDE#64549"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Improper Privilege Management in web-based management",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-3379",
    "datePublished": "2023-11-20T07:23:41.887Z",
    "dateReserved": "2023-06-23T09:01:09.552Z",
    "dateUpdated": "2024-10-02T05:34:25.860Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-4089 (GCVE-0-2023-4089)

Vulnerability from cvelistv5 – Published: 2023-10-17 06:00 – Updated: 2025-02-27 20:40
VLAI?
Summary
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
CWE
  • CWE-610 - Externally Controlled Reference to a Resource in Another Sphere
Assigner
Impacted products
Vendor Product Version
WAGO Compact Controller CC100 Affected: FW19 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Edge Controller Affected: FW18 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC100 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO PFC200 Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Advanced Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Marine Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
    WAGO Touch Panel 600 Standard Line Affected: FW16 , ≤ FW26 (semver)
Create a notification for this product.
Credits
Floris Hendriks and Jeroen Wijenbergh from Radboud University
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:17:11.728Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-4089",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-02-26T21:49:11.155380Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-02-27T20:40:32.064Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW19",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW18",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW26",
              "status": "affected",
              "version": "FW16",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Floris Hendriks and Jeroen Wijenbergh from Radboud University"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
            }
          ],
          "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-610",
              "description": "CWE-610 Externally Controlled Reference to a Resource in Another Sphere",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-17T06:00:28.908Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-046/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-046",
        "defect": [
          "CERT@VDE#64532"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Multiple products vulnerable to local file inclusion",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-4089",
    "datePublished": "2023-10-17T06:00:28.908Z",
    "dateReserved": "2023-08-02T07:20:35.600Z",
    "dateUpdated": "2025-02-27T20:40:32.064Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1150 (GCVE-0-2023-1150)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:19 – Updated: 2024-12-05 19:07
VLAI?
Summary
Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
CWE
  • CWE-772 - Missing Release of Resource after Effective Lifetime
Assigner
Impacted products
Vendor Product Version
WAGO 750-332 Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-362/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-363/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-364/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-365/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-823 Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-832/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-862 Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-890/xxx-xxx Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-891 Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
    WAGO 750-893 Affected: 0 , ≤ FW10 (semver)
Create a notification for this product.
Credits
Roman Ezhov from Kaspersky
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:40:57.941Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1150",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:06:44.632463Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:07:34.007Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-362/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-363/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-364/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-365/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Roman Ezhov from Kaspersky"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
            }
          ],
          "value": "Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-772",
              "description": "CWE-772 Missing Release of Resource after Effective Lifetime",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:26:51.589Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2023-005/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-005",
        "defect": [
          "CERT@VDE#64392"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO: Series 750-3x/-8x prone to MODBUS server DoS",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1150",
    "datePublished": "2023-06-26T06:19:53.942Z",
    "dateReserved": "2023-03-02T05:38:38.812Z",
    "dateUpdated": "2024-12-05T19:07:34.007Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1620 (GCVE-0-2023-1620)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:19 – Updated: 2024-11-12 14:11
VLAI?
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.833Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-1620",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-08T20:30:42.286955Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-12T14:11:36.673Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:51.078Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple products in multiple versions using Codesys",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1620",
    "datePublished": "2023-06-26T06:19:30.928Z",
    "dateReserved": "2023-03-24T10:12:26.426Z",
    "dateUpdated": "2024-11-12T14:11:36.673Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-1619 (GCVE-0-2023-1619)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:18 – Updated: 2024-10-02 05:28
VLAI?
Summary
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
CWE
  • CWE-1288 - Improper Validation of Consistency within Input
Assigner
References
Impacted products
Vendor Product Version
Wago 750-8202/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8203/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8204/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8206/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8207/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8208/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8210/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8211/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8212/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8213/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8214/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8216/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-8217/xxx-xxx Affected: FW1 , ≤ FW22 SP1 (custom)
Create a notification for this product.
    Wago 750-823 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-332 Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-832/xxx-xxx Affected: FW1 , ≤ FW6 (custom)
Create a notification for this product.
    Wago 750-862 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-890/xxx-xxx Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-891 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-893 Affected: FW1 , ≤ FW10 (custom)
Create a notification for this product.
    Wago 750-331 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-829 Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-831/xxx-xxx Affected: FW1 , ≤ FW14 (custom)
Create a notification for this product.
    Wago 750-852 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-880/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-881 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-882 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-885/xxx-xxx Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
    Wago 750-889 Affected: FW1 , ≤ FW16 (custom)
Create a notification for this product.
Credits
Daniel dos Santos from Forescout Abdelrahman Hassanien from Forescout
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T05:57:24.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "750-8202/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8203/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8204/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8206/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8207/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8208/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8210/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8211/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8212/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8213/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8214/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8216/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-8217/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW22 SP1",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-823",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-332",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-832/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW6",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-862",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-890/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-891",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-893",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW10",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-331",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-829",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-831/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW14",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-852",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-880/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-881",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-882",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-885/xxx-xxx",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "750-889",
          "vendor": "Wago",
          "versions": [
            {
              "lessThanOrEqual": "FW16",
              "status": "affected",
              "version": "FW1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Daniel dos Santos from Forescout"
        },
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Abdelrahman Hassanien from Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
            }
          ],
          "value": "Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1288",
              "description": "CWE-1288 Improper Validation of Consistency within Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-02T05:28:23.250Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2023-006/"
        }
      ],
      "source": {
        "advisory": "VDE-2023-006",
        "defect": [
          "CERT@VDE#64417"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: DoS in multiple versions of multiple products",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2023-1619",
    "datePublished": "2023-06-26T06:18:33.981Z",
    "dateReserved": "2023-03-24T10:12:25.218Z",
    "dateUpdated": "2024-10-02T05:28:23.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}