Show filters
11 Total Results
Displaying 1-10 of 11
Sort by:
Attacker Value
Unknown
CVE-2022-45140
Disclosure Date: February 27, 2023 (last updated October 08, 2023)
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
0
Attacker Value
Unknown
CVE-2022-45139
Disclosure Date: February 27, 2023 (last updated October 08, 2023)
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
0
Attacker Value
Unknown
CVE-2022-45138
Disclosure Date: February 27, 2023 (last updated October 08, 2023)
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
0
Attacker Value
Unknown
CVE-2022-45137
Disclosure Date: February 27, 2023 (last updated October 08, 2023)
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
0
Attacker Value
Unknown
CVE-2020-12069
Disclosure Date: December 26, 2022 (last updated October 04, 2024)
In CODESYS V3 products in all versions prior V3.5.16.0 containing the CmpUserMgr, the CODESYS Control runtime system stores the online communication passwords using a weak hashing algorithm. This can be used by a local attacker with low privileges to gain full control of the device.
0
Attacker Value
Unknown
CVE-2021-34569
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
0
Attacker Value
Unknown
CVE-2021-34566
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
0
Attacker Value
Unknown
CVE-2021-34568
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
0
Attacker Value
Unknown
CVE-2021-34567
Disclosure Date: November 09, 2022 (last updated November 09, 2023)
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
0
Attacker Value
Unknown
CVE-2022-3281
Disclosure Date: October 17, 2022 (last updated December 22, 2024)
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
0