Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Pfc100_firmware
(Wago)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 13 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-05-15 | CVE-2023-1698 | In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. | Compact_controller_100_firmware, Edge_controller_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware | 9.8 | ||
2023-02-27 | CVE-2022-45137 | The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability. | 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware | 6.1 | ||
2023-02-27 | CVE-2022-45138 | The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device. | 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware | 9.8 | ||
2023-02-27 | CVE-2022-45139 | A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality. | 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware | 5.3 | ||
2023-02-27 | CVE-2022-45140 | The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise. | 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware | 9.8 | ||
2019-04-17 | CVE-2019-10953 | ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets. | Pm554\-Tp\-Eth_firmware, Ilc_151_eth_firmware, Modicon_m221_firmware, 6ed1052\-1cc01\-0ba8_firmware, 6es7211\-1ae40\-0xb0_firmware, 6es7314\-6eh04\-0ab0_firmware, Bacnet\/ip_firmware, Ethernet_firmware, Knx_ip_firmware, Pfc100_firmware | 7.5 | ||
2020-03-11 | CVE-2019-5135 | An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) web application on WAGO PFC100/200 controllers. The WBM application makes use of the PHP crypt() function which can be exploited to disclose hashed user credentials. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12). | Pfc100_firmware, Pfc200_firmware | 5.3 | ||
2020-03-11 | CVE-2019-5134 | An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure. | Pfc100_firmware, Pfc200_firmware | N/A | ||
2020-03-11 | CVE-2019-5149 | The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This... | Pfc100_firmware, Pfc200_firmware | N/A | ||
2020-01-08 | CVE-2019-5082 | An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmware version 03.01.07(13), WAGO PFC200 Firmware version 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a heap buffer overflow, potentially resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability. | Pfc100_firmware, Pfc200_firmware | N/A |