Summary
| Detail | |||
|---|---|---|---|
| Vendor | Wago | First view | 2022-03-09 |
| Product | 750-8202/000-022 Firmware | Last view | 2023-06-26 |
| Version | * | Type | Os |
| Update | * | ||
| Edition | * | ||
| Language | * | ||
| Sofware Edition | * | ||
| Target Software | * | ||
| Target Hardware | * | ||
| Other | * | ||
| CPE Product | cpe:2.3:o:wago:750-8202/000-022_firmware | ||
Activity : Overall
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 4.9 | 2023-06-26 | CVE-2023-1620 | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime. |
| 4.9 | 2023-06-26 | CVE-2023-1619 | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet. |
| 0 | 2022-11-09 | CVE-2021-34569 | In WAGOÂ I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory. |
| 0 | 2022-11-09 | CVE-2021-34568 | In WAGOÂ I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service. |
| 0 | 2022-11-09 | CVE-2021-34567 | In WAGOÂ I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read. |
| 0 | 2022-11-09 | CVE-2021-34566 | In WAGOÂ I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS. |
| 5.4 | 2022-03-09 | CVE-2022-22511 | Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised. |






