Product:

Touch_panel_600_marine_firmware

(Wago)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 9
Date Id Summary Products Score Patch Annotated
2023-11-20 CVE-2023-3379 Wago web-based management of multiple products has a vulnerability which allows an local authenticated attacker to change the passwords of other non-admin users and thus to escalate non-root privileges. Compact_controller_100_firmware, Edge_controller_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 5.3
2023-01-19 CVE-2022-3738 The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull. Cc100_firmware, Edge_controller_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 5.9
2023-10-17 CVE-2023-4089 On affected Wago products an remote attacker with administrative privileges can access files to which he has already access to through an undocumented local file inclusion. This access is logged in a different log file than expected. Compact_controller_100_firmware, Edge_controller_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 2.7
2023-05-15 CVE-2023-1698 In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. Compact_controller_100_firmware, Edge_controller_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 9.8
2023-02-27 CVE-2022-45137 The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability. 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 6.1
2023-02-27 CVE-2022-45138 The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device. 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 9.8
2023-02-27 CVE-2022-45139 A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality. 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 5.3
2023-02-27 CVE-2022-45140 The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise. 751\-9301_firmware, 752\-8303\/8000\-002_firmware, Pfc100_firmware, Pfc200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 9.8
2020-12-17 CVE-2020-12522 The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10. Pfc_100_firmware, Pfc_200_firmware, Touch_panel_600_advanced_firmware, Touch_panel_600_marine_firmware, Touch_panel_600_standard_firmware 9.8