Vulnerabilites related to wago - touch_panel_600_standard
cve-2022-45138
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 (751-9301) |
Version: FW16 < FW22 Version: FW23 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.415Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device." } ], "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:20.474Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Missing Authentication for Critical Function", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45138", "datePublished": "2023-02-27T14:36:20.474Z", "dateReserved": "2022-11-10T09:46:59.079Z", "dateUpdated": "2024-08-03T14:09:55.415Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-4089
Vulnerability from cvelistv5
Published
2023-10-17 06:00
Modified
2024-08-02 07:17
Severity ?
EPSS score ?
Summary
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 |
Version: FW19 ≤ FW26 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T07:17:11.728Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW19", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW18", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PFC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "PFC200", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW26", "status": "affected", "version": "FW16", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Floris Hendriks and Jeroen Wijenbergh from Radboud University" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected." } ], "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-610", "description": "CWE-610 Externally Controlled Reference to a Resource in Another Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-17T06:00:28.908Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" } ], "source": { "advisory": "VDE-2023-046", "defect": [ "CERT@VDE#64532" ], "discovery": "EXTERNAL" }, "title": "WAGO: Multiple products vulnerable to local file inclusion", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2023-4089", "datePublished": "2023-10-17T06:00:28.908Z", "dateReserved": "2023-08-02T07:20:35.600Z", "dateUpdated": "2024-08-02T07:17:11.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-1698
Vulnerability from cvelistv5
Published
2023-05-15 08:51
Modified
2025-01-23 19:13
Severity ?
EPSS score ?
Summary
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 |
Version: FW20 ≤ FW22 Version: FW23 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T05:57:24.816Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-1698", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T19:12:48.907770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T19:13:09.654Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "PFC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW20", "versionType": "semver" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line", "vendor": "WAGO", "versions": [ { "status": "affected", "version": "FW22" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Quentin Kaiser from ONEKEY" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise." } ], "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise." } ], "impacts": [ { "capecId": "CAPEC-88", "descriptions": [ { "lang": "en", "value": "CAPEC-88 OS Command Injection" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-15T08:51:27.453Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" } ], "source": { "advisory": "VDE-2023-007", "defect": [ "CERT@VDE#64422" ], "discovery": "EXTERNAL" }, "title": "WAGO: WBM Command Injection in multiple products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2023-1698", "datePublished": "2023-05-15T08:51:27.453Z", "dateReserved": "2023-03-29T13:00:05.618Z", "dateUpdated": "2025-01-23T19:13:09.654Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45140
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 (751-9301) |
Version: FW16 < FW22 Version: FW23 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.436Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise." } ], "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise." } ], "impacts": [ { "capecId": "CAPEC-115", "descriptions": [ { "lang": "en", "value": "CAPEC-115 Authentication Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:39.448Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Missing Authentication for Critical Function ", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45140", "datePublished": "2023-02-27T14:36:39.448Z", "dateReserved": "2022-11-10T09:46:59.080Z", "dateUpdated": "2024-08-03T14:09:55.436Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45137
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 (751-9301) |
Version: FW16 < FW22 Version: FW23 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:56.545Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability." } ], "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:03.411Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Reflective Cross-Site Scripting", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45137", "datePublished": "2023-02-27T14:36:03.411Z", "dateReserved": "2022-11-10T09:46:59.079Z", "dateUpdated": "2024-08-03T14:09:56.545Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-45139
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
Severity ?
EPSS score ?
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller CC100 (751-9301) |
Version: FW16 < FW22 Version: FW23 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T14:09:55.406Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller CC100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW18", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-81xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-82xx/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThan": "FW22", "status": "affected", "version": "FW16", "versionType": "custom" }, { "status": "unaffected", "version": "FW22 Patch 1" }, { "status": "affected", "version": "FW23" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality." } ], "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-27T14:36:32.016Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "source": { "defect": [ "CERT@VDE#64160" ], "discovery": "UNKNOWN" }, "title": "WAGO: Origin validation error through CORS misconfiguration", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-45139", "datePublished": "2023-02-27T14:36:32.016Z", "dateReserved": "2022-11-10T09:46:59.080Z", "dateUpdated": "2024-08-03T14:09:55.406Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3738
Vulnerability from cvelistv5
Published
2023-01-19 11:27
Modified
2024-08-03 01:20
Severity ?
EPSS score ?
Summary
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Series WAGO PFC100 |
Version: FW16 ≤ FW22 |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:57.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-054/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Series WAGO PFC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Series WAGO PFC200", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Series WAGO Touch Panel 600 Advanced Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Series WAGO Touch Panel 600 Marine Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "Series WAGO Touch Panel 600 Standard Line", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "WAGO Compact Controller CC100", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] }, { "defaultStatus": "unaffected", "product": "WAGO Edge Controller", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22", "status": "affected", "version": "FW16", "versionType": "semver" } ] } ], "datePublic": "2023-01-12T08:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.\u003c/span\u003e\u003cbr\u003e" } ], "value": "The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.\n" } ], "impacts": [ { "capecId": "CAPEC-1", "descriptions": [ { "lang": "en", "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-306", "description": "CWE-306 Missing Authentication for Critical Function", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-07T09:43:18.629Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2022-054/" } ], "source": { "advisory": "VDE-2022-054", "defect": [ "CERT@VDE#64273" ], "discovery": "EXTERNAL" }, "title": "WAGO: Missing authentication for config export functionality in multiple products", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2022-3738", "datePublished": "2023-01-19T11:27:51.814Z", "dateReserved": "2022-10-28T07:18:40.653Z", "dateUpdated": "2024-08-03T01:20:57.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3379
Vulnerability from cvelistv5
Published
2023-11-20 07:23
Modified
2024-10-02 05:34
Severity ?
EPSS score ?
Summary
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
References
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | WAGO | Compact Controller 100 (751-9301) |
Version: 0 < |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:55:03.365Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-015/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Compact Controller 100 (751-9301)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PFC100 (750-810x/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22 Patch 1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-820x/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "PFC200 (750-821x/xxx-xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW22 Patch 1", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Advanced Line (762-5xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Marine Line (762-6xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Touch Panel 600 Standard Line (762-4xxx)", "vendor": "WAGO", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "product": "Edge Controller (752-8303/8000-002)", "vendor": "Wago", "versions": [ { "lessThanOrEqual": "FW25", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "user": "00000000-0000-4000-9000-000000000000", "value": "Panagiotis Bellonias from Secura" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges." } ], "value": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-863", "description": "CWE-863 Incorrect Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-02T05:34:25.860Z", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2023-015/" } ], "source": { "advisory": "VDE-2023-015", "defect": [ "CERT@VDE#64549" ], "discovery": "EXTERNAL" }, "title": "WAGO: Improper Privilege Management in web-based management", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2023-3379", "datePublished": "2023-11-20T07:23:41.887Z", "dateReserved": "2023-06-23T09:01:09.552Z", "dateUpdated": "2024-10-02T05:34:25.860Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Mitigation, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Mitigation, Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*", "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C", "versionEndExcluding": "22", "versionStartIncluding": "18", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability." } ], "id": "CVE-2022-45137", "lastModified": "2024-11-21T07:28:49.723", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-02-27T15:15:11.203", "references": [ { "source": "info@cert.vde.com", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*", "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C", "versionEndExcluding": "22", "versionStartIncluding": "18", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality." } ], "id": "CVE-2022-45139", "lastModified": "2024-11-21T07:28:50.013", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-02-27T15:15:11.407", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "info@cert.vde.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-15 09:15
Modified
2024-11-21 07:39
Severity ?
Summary
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-007/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8700EAE8-69B3-4F39-9540-EB3EB11CAB82", "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "532907AF-7E4A-4065-A799-753FC3313D6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:edge_controller_firmware:22:*:*:*:*:*:*:*", "matchCriteriaId": "17FE837A-4BAB-4963-AC1F-5BEEE769AF0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F462A5D8-4488-432E-8A63-FEE9B7215398", "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "29246E43-1289-45FB-A996-35DE3E6D8B67", "versionEndIncluding": "23", "versionStartIncluding": "20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise." } ], "id": "CVE-2023-1698", "lastModified": "2024-11-21T07:39:43.320", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-05-15T09:15:09.510", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-007/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*", "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C", "versionEndExcluding": "22", "versionStartIncluding": "18", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device." } ], "id": "CVE-2022-45138", "lastModified": "2024-11-21T07:28:49.880", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-02-27T15:15:11.317", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-19 12:15
Modified
2024-11-21 07:20
Severity ?
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
5.9 (Medium) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-054/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-054/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15CC83F6-9816-482C-A026-7654BCC95D40", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A4AEA6B-206A-4CEA-ACCE-145B139DF58B", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35EF27EB-EE11-47B6-8382-47910AA3966B", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A470D085-96C4-4DFE-A4E2-1407D49A4D9A", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79C7DB93-4282-49DB-B81E-44BBD826BFF8", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:cc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8A3E10E2-A0AA-47E2-B314-51A86BEB2208", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:cc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "632388B3-E59E-480E-9F0F-08A9F4E87159", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F31F6E66-78B4-4F7B-BAE6-0C38D1307A4B", "versionEndIncluding": "22", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.\n" }, { "lang": "es", "value": "La vulnerabilidad permite a un atacante remoto no autenticado descargar un archivo de copia de seguridad, si existe. Ese archivo de copia de seguridad puede contener informaci\u00f3n confidencial, como credenciales y material criptogr\u00e1fico. Un usuario v\u00e1lido debe crear una copia de seguridad despu\u00e9s del \u00faltimo reinicio para que este ataque tenga \u00e9xito." } ], "id": "CVE-2022-3738", "lastModified": "2024-11-21T07:20:08.493", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "info@cert.vde.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-01-19T12:15:11.213", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-054/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-054/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2022-060/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*", "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C", "versionEndExcluding": "22", "versionStartIncluding": "18", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*", "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB", "versionEndExcluding": "22", "versionStartIncluding": "16", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise." } ], "id": "CVE-2022-45140", "lastModified": "2024-11-21T07:28:50.143", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-02-27T15:15:11.503", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2022-060/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-306" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-10-17 07:15
Modified
2024-11-21 08:34
Severity ?
Summary
On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-046/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-046/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A495C583-8184-45A5-81E9-E621A58B7E51", "versionEndIncluding": "26", "versionStartIncluding": "19", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "532907AF-7E4A-4065-A799-753FC3313D6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85625EA0-E44C-4A48-BA05-5D506CFDB678", "versionEndIncluding": "26", "versionStartIncluding": "18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E5D5929-675F-493C-B3AF-70C7C79D3CEB", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F73AE30-E917-433E-BB67-CA383FCDDAFC", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA3F602-1720-4B4B-A834-BD620D9B1F54", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1FED163-F917-4CBC-83DA-D4D751C9121B", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98F0C3C2-DE57-4134-AC3C-3D000A33528A", "versionEndIncluding": "26", "versionStartIncluding": "16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected." }, { "lang": "es", "value": "En los productos Wago afectados, un atacante remoto con privilegios administrativos puede acceder a archivos a los que ya tiene acceso a trav\u00e9s de una inclusi\u00f3n de archivo local no documentada. Este acceso se registra en un archivo de registro diferente al esperado." } ], "id": "CVE-2023-4089", "lastModified": "2024-11-21T08:34:22.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 1.4, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-10-17T07:15:10.090", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-046/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-610" } ], "source": "info@cert.vde.com", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-20 08:15
Modified
2024-11-21 08:17
Severity ?
Summary
Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.
References
▼ | URL | Tags | |
---|---|---|---|
info@cert.vde.com | https://cert.vde.com/en/advisories/VDE-2023-015/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en/advisories/VDE-2023-015/ | Third Party Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:compact_controller_100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6F27D52-0A31-4CE5-823B-7DA6DCF291AD", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:compact_controller_100:-:*:*:*:*:*:*:*", "matchCriteriaId": "532907AF-7E4A-4065-A799-753FC3313D6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:edge_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "67EF75C3-893E-408D-B3C6-464F3C7AC27D", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:edge_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DFC57C8-6AF4-4771-B0A0-744137FBFECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "252F9DAE-5C46-48B3-A74A-8331DE3B5189", "versionEndExcluding": "22", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:patch_1:*:*:*:*:*:*", "matchCriteriaId": "8F71E8B5-7774-45BB-8B7D-7C38A4B90EA0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C741BCDD-8485-4DDC-9D51-143F1EE4824E", "versionEndExcluding": "22", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*", "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:patch_1:*:*:*:*:*:*", "matchCriteriaId": "CA491C96-F0CF-4960-8F91-831E80622D5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*", "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C", "vulnerable": true }, { "criteria": "cpe:2.3:o:wago:pfc200_firmware:24:*:*:*:*:*:*:*", "matchCriteriaId": "C4E45E9B-3F87-4758-8BCE-BCF79AD225DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*", "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD598E88-4682-43AD-AD12-2763B931416C", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9018036-B119-472C-A5A3-D0253E2FA425", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*", "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99BEC3AF-787E-441A-A181-A491E119295B", "versionEndIncluding": "25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges." }, { "lang": "es", "value": "La administraci\u00f3n de m\u00faltiples productos basada en web de Wago tiene una vulnerabilidad que permite a un atacante autenticado local cambiar las contrase\u00f1as de otros usuarios que no sean administradores y as\u00ed escalar privilegios no root." } ], "id": "CVE-2023-3379", "lastModified": "2024-11-21T08:17:08.337", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "info@cert.vde.com", "type": "Primary" } ] }, "published": "2023-11-20T08:15:44.280", "references": [ { "source": "info@cert.vde.com", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-015/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert.vde.com/en/advisories/VDE-2023-015/" } ], "sourceIdentifier": "info@cert.vde.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-863" } ], "source": "info@cert.vde.com", "type": "Primary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Secondary" } ] }