7.2

CVE-2024-1490

Wago: Vulnerability in WBM through Open VPN

An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerWAGO
Produkt CC100 (0751-9x01)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt PFC100 G1 (0750-810-xxxx-xxxx)
Default Statusunaffected
Version <= 3.10.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt PFC100 G2 (0750-811x-xxxx-xxxx)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt PFC200 G1 (750-820x-xxxx-xxxx)
Default Statusunaffected
Version <= 3.10.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt PFC200 G2 (750-821x-xxxx-xxxx)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-420x-8000-000x)
Default Statusunaffected
Version <= FW 26
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-430x-8000-000x)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-520x-8000-000x)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-530x-8000-000x)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-620x-8000-000x)
Default Statusunaffected
Version 0.0.0
Status affected
HerstellerWAGO
Produkt TP600 (0762-630x-8000-000x)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt Edge Controller (0752-8303-8000-0002)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
HerstellerWAGO
Produkt WP400 (0762-340x)
Default Statusunaffected
Version <= 4.5.10
Version 0.0.0
Status affected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.1% 0.279
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
info@cert.vde.com 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.