In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Wago
Subscribe
|
750-8100
Subscribe
750-8100 Firmware
Subscribe
750-8101
Subscribe
750-8101\/025-000
Subscribe
750-8101\/025-000 Firmware
Subscribe
750-8101 Firmware
Subscribe
750-8102
Subscribe
750-8102\/025-000
Subscribe
750-8102\/025-000 Firmware
Subscribe
750-8102 Firmware
Subscribe
750-8202
Subscribe
750-8202\/000-011
Subscribe
750-8202\/000-011 Firmware
Subscribe
750-8202\/000-012
Subscribe
750-8202\/000-012 Firmware
Subscribe
750-8202\/000-022
Subscribe
750-8202\/000-022 Firmware
Subscribe
750-8202\/025-000
Subscribe
750-8202\/025-000 Firmware
Subscribe
750-8202\/025-001
Subscribe
750-8202\/025-001 Firmware
Subscribe
750-8202\/025-002
Subscribe
750-8202\/025-002 Firmware
Subscribe
750-8202\/040-000
Subscribe
750-8202\/040-000 Firmware
Subscribe
750-8202\/040-001
Subscribe
750-8202\/040-001 Firmware
Subscribe
750-8202 Firmware
Subscribe
752-8303\/8000-002
Subscribe
752-8303\/8000-002 Firmware
Subscribe
762-4101
Subscribe
762-4101 Firmware
Subscribe
762-4102
Subscribe
762-4102 Firmware
Subscribe
762-4103
Subscribe
762-4103 Firmware
Subscribe
762-4104
Subscribe
762-4104 Firmware
Subscribe
762-4201\/8000-001
Subscribe
762-4201\/8000-001 Firmware
Subscribe
762-4202\/8000-001
Subscribe
762-4202\/8000-001 Firmware
Subscribe
762-4203\/8000-001
Subscribe
762-4203\/8000-001 Firmware
Subscribe
762-4204\/8000-001
Subscribe
762-4204\/8000-001 Firmware
Subscribe
762-4205\/8000-001
Subscribe
762-4205\/8000-001 Firmware
Subscribe
762-4205\/8000-002
Subscribe
762-4205\/8000-002 Firmware
Subscribe
762-4206\/8000-001
Subscribe
762-4206\/8000-001 Firmware
Subscribe
762-4206\/8000-002
Subscribe
762-4206\/8000-002 Firmware
Subscribe
762-4301\/8000-002
Subscribe
762-4301\/8000-002 Firmware
Subscribe
762-4302\/8000-002
Subscribe
762-4302\/8000-002 Firmware
Subscribe
762-4303\/8000-002
Subscribe
762-4303\/8000-002 Firmware
Subscribe
762-4304\/8000-002
Subscribe
762-4304\/8000-002 Firmware
Subscribe
762-4305\/8000-002
Subscribe
762-4305\/8000-002 Firmware
Subscribe
762-4306\/8000-002
Subscribe
762-4306\/8000-002 Firmware
Subscribe
762-5203\/8000-001
Subscribe
762-5203\/8000-001 Firmware
Subscribe
762-5204\/8000-001
Subscribe
762-5204\/8000-001 Firmware
Subscribe
762-5205\/8000-001
Subscribe
762-5205\/8000-001 Firmware
Subscribe
762-5206\/8000-001
Subscribe
762-5206\/8000-001 Firmware
Subscribe
762-5303\/8000-002
Subscribe
762-5303\/8000-002 Firmware
Subscribe
762-5304\/8000-002
Subscribe
762-5304\/8000-002 Firmware
Subscribe
762-5305\/8000-002
Subscribe
762-5305\/8000-002 Firmware
Subscribe
762-5306\/8000-002
Subscribe
762-5306\/8000-002 Firmware
Subscribe
762-6201\/8000-001
Subscribe
762-6201\/8000-001 Firmware
Subscribe
762-6202\/8000-001
Subscribe
762-6202\/8000-001 Firmware
Subscribe
762-6203\/8000-001
Subscribe
762-6203\/8000-001 Firmware
Subscribe
762-6204\/8000-001
Subscribe
762-6204\/8000-001 Firmware
Subscribe
762-6301\/8000-002
Subscribe
762-6301\/8000-002 Firmware
Subscribe
762-6302\/8000-002
Subscribe
762-6302\/8000-002 Firmware
Subscribe
762-6303\/8000-002
Subscribe
762-6303\/8000-002 Firmware
Subscribe
762-6304\/8000-002
Subscribe
762-6304\/8000-002 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21216 | In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2020-036/ |
|
History
Thu, 01 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-05-01T14:21:10.643Z
Reserved: 2021-06-10T19:19:08.023Z
Link: CVE-2021-34566
Updated: 2024-08-04T00:12:50.402Z
Status : Modified
Published: 2022-11-09T16:15:10.613
Modified: 2024-11-21T06:10:42.230
Link: CVE-2021-34566
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD