Wago

Touch Panel 600 Standard Firmware

9 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.03%
  • Published 20.11.2023 08:15:44
  • Last modified 21.11.2024 08:17:08

Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges.

  • EPSS 0.09%
  • Published 17.10.2023 07:15:10
  • Last modified 21.11.2024 08:34:22

On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected.

  • EPSS 93.76%
  • Published 15.05.2023 09:15:09
  • Last modified 21.11.2024 07:39:43

In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.

  • EPSS 0.1%
  • Published 27.02.2023 15:15:11
  • Last modified 21.11.2024 07:28:49

The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.

  • EPSS 0.21%
  • Published 27.02.2023 15:15:11
  • Last modified 21.11.2024 07:28:49

The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameter...

  • EPSS 0.05%
  • Published 27.02.2023 15:15:11
  • Last modified 21.11.2024 07:28:50

A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagn...

  • EPSS 1.45%
  • Published 27.02.2023 15:15:11
  • Last modified 21.11.2024 07:28:50

The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.

  • EPSS 0.09%
  • Published 19.01.2023 12:15:11
  • Last modified 21.11.2024 07:20:08

The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last ...

  • EPSS 0.18%
  • Published 17.12.2020 23:15:13
  • Last modified 21.11.2024 04:59:51

The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line ...