In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.

Project Subscriptions

Vendors Products
750-8100 Subscribe
750-8100 Firmware Subscribe
750-8101 Subscribe
750-8101\/025-000 Subscribe
750-8101\/025-000 Firmware Subscribe
750-8101 Firmware Subscribe
750-8102 Subscribe
750-8102\/025-000 Subscribe
750-8102\/025-000 Firmware Subscribe
750-8102 Firmware Subscribe
750-8202 Subscribe
750-8202\/000-011 Subscribe
750-8202\/000-011 Firmware Subscribe
750-8202\/000-012 Subscribe
750-8202\/000-012 Firmware Subscribe
750-8202\/000-022 Subscribe
750-8202\/000-022 Firmware Subscribe
750-8202\/025-000 Subscribe
750-8202\/025-000 Firmware Subscribe
750-8202\/025-001 Subscribe
750-8202\/025-001 Firmware Subscribe
750-8202\/025-002 Subscribe
750-8202\/025-002 Firmware Subscribe
750-8202\/040-000 Subscribe
750-8202\/040-000 Firmware Subscribe
750-8202\/040-001 Subscribe
750-8202\/040-001 Firmware Subscribe
750-8202 Firmware Subscribe
752-8303\/8000-002 Subscribe
752-8303\/8000-002 Firmware Subscribe
762-4101 Subscribe
762-4101 Firmware Subscribe
762-4102 Subscribe
762-4102 Firmware Subscribe
762-4103 Subscribe
762-4103 Firmware Subscribe
762-4104 Subscribe
762-4104 Firmware Subscribe
762-4201\/8000-001 Subscribe
762-4201\/8000-001 Firmware Subscribe
762-4202\/8000-001 Subscribe
762-4202\/8000-001 Firmware Subscribe
762-4203\/8000-001 Subscribe
762-4203\/8000-001 Firmware Subscribe
762-4204\/8000-001 Subscribe
762-4204\/8000-001 Firmware Subscribe
762-4205\/8000-001 Subscribe
762-4205\/8000-001 Firmware Subscribe
762-4205\/8000-002 Subscribe
762-4205\/8000-002 Firmware Subscribe
762-4206\/8000-001 Subscribe
762-4206\/8000-001 Firmware Subscribe
762-4206\/8000-002 Subscribe
762-4206\/8000-002 Firmware Subscribe
762-4301\/8000-002 Subscribe
762-4301\/8000-002 Firmware Subscribe
762-4302\/8000-002 Subscribe
762-4302\/8000-002 Firmware Subscribe
762-4303\/8000-002 Subscribe
762-4303\/8000-002 Firmware Subscribe
762-4304\/8000-002 Subscribe
762-4304\/8000-002 Firmware Subscribe
762-4305\/8000-002 Subscribe
762-4305\/8000-002 Firmware Subscribe
762-4306\/8000-002 Subscribe
762-4306\/8000-002 Firmware Subscribe
762-5203\/8000-001 Subscribe
762-5203\/8000-001 Firmware Subscribe
762-5204\/8000-001 Subscribe
762-5204\/8000-001 Firmware Subscribe
762-5205\/8000-001 Subscribe
762-5205\/8000-001 Firmware Subscribe
762-5206\/8000-001 Subscribe
762-5206\/8000-001 Firmware Subscribe
762-5303\/8000-002 Subscribe
762-5303\/8000-002 Firmware Subscribe
762-5304\/8000-002 Subscribe
762-5304\/8000-002 Firmware Subscribe
762-5305\/8000-002 Subscribe
762-5305\/8000-002 Firmware Subscribe
762-5306\/8000-002 Subscribe
762-5306\/8000-002 Firmware Subscribe
762-6201\/8000-001 Subscribe
762-6201\/8000-001 Firmware Subscribe
762-6202\/8000-001 Subscribe
762-6202\/8000-001 Firmware Subscribe
762-6203\/8000-001 Subscribe
762-6203\/8000-001 Firmware Subscribe
762-6204\/8000-001 Subscribe
762-6204\/8000-001 Firmware Subscribe
762-6301\/8000-002 Subscribe
762-6301\/8000-002 Firmware Subscribe
762-6302\/8000-002 Subscribe
762-6302\/8000-002 Firmware Subscribe
762-6303\/8000-002 Subscribe
762-6303\/8000-002 Firmware Subscribe
762-6304\/8000-002 Subscribe
762-6304\/8000-002 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21216 In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-05-01T14:21:10.643Z

Reserved: 2021-06-10T19:19:08.023Z

Link: CVE-2021-34566

cve-icon Vulnrichment

Updated: 2024-08-04T00:12:50.402Z

cve-icon NVD

Status : Modified

Published: 2022-11-09T16:15:10.613

Modified: 2024-11-21T06:10:42.230

Link: CVE-2021-34566

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses