WAGO I/O-Check Service prone to Memory Overflow
CVE-2021-34566

9.1CRITICAL

Key Information:

Vendor
Wago
Vendor
CVE Published:
9 November 2022

Summary

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.

Affected Version(s)

750-81xx/xxx-xxxFW FW1

750-82xx/xxx-xxx FW1

752-8303/8000-0002 FW1

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

These vulnerabilities were reported to WAGO by Uri Katz of Claroty.
.