Lucene search

K

8 matches found

CVE
CVE
added 2019/05/07 10:29 p.m.80 views

CVE-2019-10712

The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access.

9.8CVSS9.4AI score0.00983EPSS
CVE
CVE
added 2020/12/10 3:15 a.m.62 views

CVE-2020-12516

Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.

7.5CVSS7.4AI score0.00675EPSS
CVE
CVE
added 2018/04/03 1:29 p.m.56 views

CVE-2018-8836

Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage of an improper implementation of the 3 way handshake during a TCP connection affecting the communications with commission and service tools. Specially crafted packets may also be sent to Port 2455/TCP...

5.3CVSS5.2AI score0.03324EPSS
CVE
CVE
added 2020/09/30 4:15 p.m.56 views

CVE-2020-12505

Improper Authentication vulnerability in WAGO 750-8XX series with FW version

9.1CVSS8.2AI score0.00269EPSS
CVE
CVE
added 2023/06/26 7:15 a.m.44 views

CVE-2023-1619

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.

4.9CVSS5.1AI score0.00172EPSS
CVE
CVE
added 2021/05/24 11:15 a.m.42 views

CVE-2021-21001

On WAGO PFC200 devices in different firmware versions with special crafted packets an authorised attacker with network access to the device can access the file system with higher privileges.

9.1CVSS7AI score0.00238EPSS
CVE
CVE
added 2021/05/24 11:15 a.m.40 views

CVE-2021-21000

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

7.5CVSS6.2AI score0.0013EPSS
CVE
CVE
added 2023/06/26 7:15 a.m.38 views

CVE-2023-1620

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.

4.9CVSS5.1AI score0.00126EPSS