In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

Project Subscriptions

Vendors Products
750-8100 Subscribe
750-8100 Firmware Subscribe
750-8101 Subscribe
750-8101\/025-000 Subscribe
750-8101\/025-000 Firmware Subscribe
750-8101 Firmware Subscribe
750-8102 Subscribe
750-8102\/025-000 Subscribe
750-8102\/025-000 Firmware Subscribe
750-8102 Firmware Subscribe
750-8202 Subscribe
750-8202\/000-011 Subscribe
750-8202\/000-011 Firmware Subscribe
750-8202\/000-012 Subscribe
750-8202\/000-012 Firmware Subscribe
750-8202\/000-022 Subscribe
750-8202\/000-022 Firmware Subscribe
750-8202\/025-000 Subscribe
750-8202\/025-000 Firmware Subscribe
750-8202\/025-001 Subscribe
750-8202\/025-001 Firmware Subscribe
750-8202\/025-002 Subscribe
750-8202\/025-002 Firmware Subscribe
750-8202\/040-000 Subscribe
750-8202\/040-000 Firmware Subscribe
750-8202\/040-001 Subscribe
750-8202\/040-001 Firmware Subscribe
750-8202 Firmware Subscribe
752-8303\/8000-002 Subscribe
752-8303\/8000-002 Firmware Subscribe
762-4101 Subscribe
762-4101 Firmware Subscribe
762-4102 Subscribe
762-4102 Firmware Subscribe
762-4103 Subscribe
762-4103 Firmware Subscribe
762-4104 Subscribe
762-4104 Firmware Subscribe
762-4201\/8000-001 Subscribe
762-4201\/8000-001 Firmware Subscribe
762-4202\/8000-001 Subscribe
762-4202\/8000-001 Firmware Subscribe
762-4203\/8000-001 Subscribe
762-4203\/8000-001 Firmware Subscribe
762-4204\/8000-001 Subscribe
762-4204\/8000-001 Firmware Subscribe
762-4205\/8000-001 Subscribe
762-4205\/8000-001 Firmware Subscribe
762-4205\/8000-002 Subscribe
762-4205\/8000-002 Firmware Subscribe
762-4206\/8000-001 Subscribe
762-4206\/8000-001 Firmware Subscribe
762-4206\/8000-002 Subscribe
762-4206\/8000-002 Firmware Subscribe
762-4301\/8000-002 Subscribe
762-4301\/8000-002 Firmware Subscribe
762-4302\/8000-002 Subscribe
762-4302\/8000-002 Firmware Subscribe
762-4303\/8000-002 Subscribe
762-4303\/8000-002 Firmware Subscribe
762-4304\/8000-002 Subscribe
762-4304\/8000-002 Firmware Subscribe
762-4305\/8000-002 Subscribe
762-4305\/8000-002 Firmware Subscribe
762-4306\/8000-002 Subscribe
762-4306\/8000-002 Firmware Subscribe
762-5203\/8000-001 Subscribe
762-5203\/8000-001 Firmware Subscribe
762-5204\/8000-001 Subscribe
762-5204\/8000-001 Firmware Subscribe
762-5205\/8000-001 Subscribe
762-5205\/8000-001 Firmware Subscribe
762-5206\/8000-001 Subscribe
762-5206\/8000-001 Firmware Subscribe
762-5303\/8000-002 Subscribe
762-5303\/8000-002 Firmware Subscribe
762-5304\/8000-002 Subscribe
762-5304\/8000-002 Firmware Subscribe
762-5305\/8000-002 Subscribe
762-5305\/8000-002 Firmware Subscribe
762-5306\/8000-002 Subscribe
762-5306\/8000-002 Firmware Subscribe
762-6201\/8000-001 Subscribe
762-6201\/8000-001 Firmware Subscribe
762-6202\/8000-001 Subscribe
762-6202\/8000-001 Firmware Subscribe
762-6203\/8000-001 Subscribe
762-6203\/8000-001 Firmware Subscribe
762-6204\/8000-001 Subscribe
762-6204\/8000-001 Firmware Subscribe
762-6301\/8000-002 Subscribe
762-6301\/8000-002 Firmware Subscribe
762-6302\/8000-002 Subscribe
762-6302\/8000-002 Firmware Subscribe
762-6303\/8000-002 Subscribe
762-6303\/8000-002 Firmware Subscribe
762-6304\/8000-002 Subscribe
762-6304\/8000-002 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-21218 In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 01 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2025-05-01T14:20:17.218Z

Reserved: 2021-06-10T19:19:08.023Z

Link: CVE-2021-34568

cve-icon Vulnrichment

Updated: 2024-08-04T00:12:50.423Z

cve-icon NVD

Status : Modified

Published: 2022-11-09T16:15:12.077

Modified: 2024-11-21T06:10:42.647

Link: CVE-2021-34568

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses