On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

Project Subscriptions

Vendors Products
750-8202 Subscribe
750-8202 Firmware Subscribe
750-8203 Subscribe
750-8203 Firmware Subscribe
750-8204 Subscribe
750-8204 Firmware Subscribe
750-8206 Subscribe
750-8206 Firmware Subscribe
750-8207 Subscribe
750-8207 Firmware Subscribe
750-8208 Subscribe
750-8208 Firmware Subscribe
750-8210 Subscribe
750-8210 Firmware Subscribe
750-8211 Subscribe
750-8211 Firmware Subscribe
750-8212 Subscribe
750-8212 Firmware Subscribe
750-8213 Subscribe
750-8213 Firmware Subscribe
750-8214 Subscribe
750-8214 Firmware Subscribe
750-8216 Subscribe
750-8216 Firmware Subscribe
750-8217 Subscribe
750-8217 Firmware Subscribe
750-823 Subscribe
750-823 Firmware Subscribe
750-829 Subscribe
750-829 Firmware Subscribe
750-831 Subscribe
750-831 Firmware Subscribe
750-832 Subscribe
750-832 Firmware Subscribe
750-852 Subscribe
750-852 Firmware Subscribe
750-862 Subscribe
750-862 Firmware Subscribe
750-880 Subscribe
750-880 Firmware Subscribe
750-881 Subscribe
750-881 Firmware Subscribe
750-882 Subscribe
750-882 Firmware Subscribe
750-885 Subscribe
750-885 Firmware Subscribe
750-889 Subscribe
750-889 Firmware Subscribe
750-890 Subscribe
750-890 Firmware Subscribe
750-891 Subscribe
750-891 Firmware Subscribe
750-893 Subscribe
750-893 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-8409 On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.
Fixes

Solution

WAGO recommends all effected users with CODESYS 2.3 Runtime PLCs to update to the firmware versions listed at https://cert.vde.com/en-us/advisories/vde-2021-014 in the solution paragraph.


Workaround

Use general security best practices to protect systems from local and network attacks. Do not allow direct access to the device from untrusted networks. Update to the latest firmware according to the table in chapter solutions.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-16T18:43:52.677Z

Reserved: 2020-12-17T00:00:00

Link: CVE-2021-21000

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-05-24T11:15:07.917

Modified: 2025-08-15T20:21:18.653

Link: CVE-2021-21000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses