9.8

CVE-2022-45138

The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.

Data is provided by the National Vulnerability Database (NVD)
Wago751-9301 Firmware Version >= 16 < 22
   Wago751-9301 Version-
Wago751-9301 Firmware Version22 Update-
   Wago751-9301 Version-
Wago751-9301 Firmware Version23
   Wago751-9301 Version-
Wago752-8303/8000-002 Firmware Version >= 18 < 22
   Wago752-8303/8000-002 Version-
Wago752-8303/8000-002 Firmware Version22 Update-
   Wago752-8303/8000-002 Version-
Wago752-8303/8000-002 Firmware Version23
   Wago752-8303/8000-002 Version-
WagoPfc100 Firmware Version >= 16 < 22
   WagoPfc100 Version-
WagoPfc100 Firmware Version22 Update-
   WagoPfc100 Version-
WagoPfc100 Firmware Version23
   WagoPfc100 Version-
WagoPfc200 Firmware Version >= 16 < 22
   WagoPfc200 Version-
WagoPfc200 Firmware Version22 Update-
   WagoPfc200 Version-
WagoPfc200 Firmware Version23
   WagoPfc200 Version-
WagoTouch Panel 600 Advanced Firmware Version >= 16 < 22
   WagoTouch Panel 600 Advanced Version-
WagoTouch Panel 600 Advanced Firmware Version22 Update-
   WagoTouch Panel 600 Advanced Version-
WagoTouch Panel 600 Marine Firmware Version >= 16 < 22
   WagoTouch Panel 600 Marine Version-
WagoTouch Panel 600 Marine Firmware Version22 Update-
   WagoTouch Panel 600 Marine Version-
WagoTouch Panel 600 Standard Firmware Version >= 16 < 22
   WagoTouch Panel 600 Standard Version-
WagoTouch Panel 600 Standard Firmware Version22 Update-
   WagoTouch Panel 600 Standard Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.21% 0.41
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
info@cert.vde.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-306 Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.