Show filters
7 Total Results
Displaying 1-7 of 7
Sort by:
Attacker Value
Unknown
CVE-2023-1620
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.
0
Attacker Value
Unknown
CVE-2023-1619
Disclosure Date: June 26, 2023 (last updated October 08, 2023)
Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.
0
Attacker Value
Unknown
CVE-2021-34569
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
0
Attacker Value
Unknown
CVE-2021-34566
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
0
Attacker Value
Unknown
CVE-2021-34568
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
0
Attacker Value
Unknown
CVE-2021-34567
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
0
Attacker Value
Unknown
CVE-2022-3281
Disclosure Date: October 17, 2022 (last updated December 22, 2024)
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
0