Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact Low
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.0013.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Wago
Subscribe
|
750-8202
Subscribe
750-8202 Firmware
Subscribe
750-8203
Subscribe
750-8203 Firmware
Subscribe
750-8204
Subscribe
750-8204 Firmware
Subscribe
750-8206
Subscribe
750-8206 Firmware
Subscribe
750-8207
Subscribe
750-8207 Firmware
Subscribe
750-8208
Subscribe
750-8208 Firmware
Subscribe
750-8210
Subscribe
750-8210 Firmware
Subscribe
750-8211
Subscribe
750-8211 Firmware
Subscribe
750-8212
Subscribe
750-8212 Firmware
Subscribe
750-8213
Subscribe
750-8213 Firmware
Subscribe
750-8214
Subscribe
750-8214 Firmware
Subscribe
750-8216
Subscribe
750-8216 Firmware
Subscribe
750-8217
Subscribe
750-8217 Firmware
Subscribe
750-823
Subscribe
750-823 Firmware
Subscribe
750-829
Subscribe
750-829 Firmware
Subscribe
750-831
Subscribe
750-831 Firmware
Subscribe
750-832
Subscribe
750-832 Firmware
Subscribe
750-852
Subscribe
750-852 Firmware
Subscribe
750-862
Subscribe
750-862 Firmware
Subscribe
750-880
Subscribe
750-880 Firmware
Subscribe
750-881
Subscribe
750-881 Firmware
Subscribe
750-882
Subscribe
750-882 Firmware
Subscribe
750-885
Subscribe
750-885 Firmware
Subscribe
750-889
Subscribe
750-889 Firmware
Subscribe
750-890
Subscribe
750-890 Firmware
Subscribe
750-891
Subscribe
750-891 Firmware
Subscribe
750-893
Subscribe
750-893 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8409 | On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime. |
Solution
WAGO recommends all effected users with CODESYS 2.3 Runtime PLCs to update to the firmware versions listed at https://cert.vde.com/en-us/advisories/vde-2021-014 in the solution paragraph.
Workaround
Use general security best practices to protect systems from local and network attacks. Do not allow direct access to the device from untrusted networks. Update to the latest firmware according to the table in chapter solutions.
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-014 |
|
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T18:43:52.677Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-21000
No data.
Status : Analyzed
Published: 2021-05-24T11:15:07.917
Modified: 2025-08-15T20:21:18.653
Link: CVE-2021-21000
No data.
OpenCVE Enrichment
No data.
EUVD