Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.01089.
Exploitation none
Automatable yes
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Wago
Subscribe
|
750-8100
Subscribe
750-8100 Firmware
Subscribe
750-8101
Subscribe
750-8101\/025-000
Subscribe
750-8101\/025-000 Firmware
Subscribe
750-8101 Firmware
Subscribe
750-8102
Subscribe
750-8102\/025-000
Subscribe
750-8102\/025-000 Firmware
Subscribe
750-8102 Firmware
Subscribe
750-8202
Subscribe
750-8202\/000-011
Subscribe
750-8202\/000-011 Firmware
Subscribe
750-8202\/000-012
Subscribe
750-8202\/000-012 Firmware
Subscribe
750-8202\/000-022
Subscribe
750-8202\/000-022 Firmware
Subscribe
750-8202\/025-000
Subscribe
750-8202\/025-000 Firmware
Subscribe
750-8202\/025-001
Subscribe
750-8202\/025-001 Firmware
Subscribe
750-8202\/025-002
Subscribe
750-8202\/025-002 Firmware
Subscribe
750-8202\/040-000
Subscribe
750-8202\/040-000 Firmware
Subscribe
750-8202\/040-001
Subscribe
750-8202\/040-001 Firmware
Subscribe
750-8202 Firmware
Subscribe
752-8303\/8000-002
Subscribe
752-8303\/8000-002 Firmware
Subscribe
762-4101
Subscribe
762-4101 Firmware
Subscribe
762-4102
Subscribe
762-4102 Firmware
Subscribe
762-4103
Subscribe
762-4103 Firmware
Subscribe
762-4104
Subscribe
762-4104 Firmware
Subscribe
762-4201\/8000-001
Subscribe
762-4201\/8000-001 Firmware
Subscribe
762-4202\/8000-001
Subscribe
762-4202\/8000-001 Firmware
Subscribe
762-4203\/8000-001
Subscribe
762-4203\/8000-001 Firmware
Subscribe
762-4204\/8000-001
Subscribe
762-4204\/8000-001 Firmware
Subscribe
762-4205\/8000-001
Subscribe
762-4205\/8000-001 Firmware
Subscribe
762-4205\/8000-002
Subscribe
762-4205\/8000-002 Firmware
Subscribe
762-4206\/8000-001
Subscribe
762-4206\/8000-001 Firmware
Subscribe
762-4206\/8000-002
Subscribe
762-4206\/8000-002 Firmware
Subscribe
762-4301\/8000-002
Subscribe
762-4301\/8000-002 Firmware
Subscribe
762-4302\/8000-002
Subscribe
762-4302\/8000-002 Firmware
Subscribe
762-4303\/8000-002
Subscribe
762-4303\/8000-002 Firmware
Subscribe
762-4304\/8000-002
Subscribe
762-4304\/8000-002 Firmware
Subscribe
762-4305\/8000-002
Subscribe
762-4305\/8000-002 Firmware
Subscribe
762-4306\/8000-002
Subscribe
762-4306\/8000-002 Firmware
Subscribe
762-5203\/8000-001
Subscribe
762-5203\/8000-001 Firmware
Subscribe
762-5204\/8000-001
Subscribe
762-5204\/8000-001 Firmware
Subscribe
762-5205\/8000-001
Subscribe
762-5205\/8000-001 Firmware
Subscribe
762-5206\/8000-001
Subscribe
762-5206\/8000-001 Firmware
Subscribe
762-5303\/8000-002
Subscribe
762-5303\/8000-002 Firmware
Subscribe
762-5304\/8000-002
Subscribe
762-5304\/8000-002 Firmware
Subscribe
762-5305\/8000-002
Subscribe
762-5305\/8000-002 Firmware
Subscribe
762-5306\/8000-002
Subscribe
762-5306\/8000-002 Firmware
Subscribe
762-6201\/8000-001
Subscribe
762-6201\/8000-001 Firmware
Subscribe
762-6202\/8000-001
Subscribe
762-6202\/8000-001 Firmware
Subscribe
762-6203\/8000-001
Subscribe
762-6203\/8000-001 Firmware
Subscribe
762-6204\/8000-001
Subscribe
762-6204\/8000-001 Firmware
Subscribe
762-6301\/8000-002
Subscribe
762-6301\/8000-002 Firmware
Subscribe
762-6302\/8000-002
Subscribe
762-6302\/8000-002 Firmware
Subscribe
762-6303\/8000-002
Subscribe
762-6303\/8000-002 Firmware
Subscribe
762-6304\/8000-002
Subscribe
762-6304\/8000-002 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
Configuration 47 [-]
| AND |
|
Configuration 48 [-]
| AND |
|
Configuration 49 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21216 | In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2020-036/ |
|
Thu, 01 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2025-05-01T14:21:10.643Z
Reserved: 2021-06-10T19:19:08.023Z
Link: CVE-2021-34566
Updated: 2024-08-04T00:12:50.402Z
Status : Modified
Published: 2022-11-09T16:15:10.613
Modified: 2024-11-21T06:10:42.230
Link: CVE-2021-34566
No data.
OpenCVE Enrichment
No data.
EUVD