WAGO 750-8202/025-001

CPE Details

WAGO 750-8202/025-001
-
2018-03-12
13h07 +00:00
2021-05-20
13h31 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:h:wago:750-8202\/025-001:-:*:*:*:*:*:*:*

Informations

Vendor

wago

Product

750-8202\/025-001

Version

-

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2023-1620 2023-06-26 06h19 +00:00 Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
4.9
Moyen
CVE-2023-1619 2023-06-26 06h18 +00:00 Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
4.9
Moyen
CVE-2021-34569 2022-11-09 15h17 +00:00 In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
9.8
Critique
CVE-2021-34568 2022-11-09 15h17 +00:00 In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
7.5
Haute
CVE-2021-34567 2022-11-09 15h17 +00:00 In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
8.2
Haute
CVE-2021-34566 2022-11-09 15h17 +00:00 In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
9.1
Critique
CVE-2022-22511 2022-03-09 19h38 +00:00 Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.
5.4
Moyen
CVE-2018-5459 2018-02-13 20h00 +00:00 An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455.
9.8
Critique