In CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56 unauthenticated crafted invalid requests may result in several denial-of-service conditions. Running PLC programs may be stopped, memory may be leaked, or further communication clients may be blocked from accessing the PLC.
Fixes

Solution

CODESYS GmbH has released the following product versions to solve the noted vulnerability issue for the affected CODESYS products: * CODESYS Runtime Toolkit 32 bit full version V2.4.7.56 * CODESYS PLCWinNT version V2.4.7.56. This will also be part of the CODESYS Development System setup version V2.3.9.68.


Workaround

No workaround given by the vendor.

History

Fri, 15 Aug 2025 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Wago
Wago 750-8202
Wago 750-8202 Firmware
Wago 750-8203
Wago 750-8203 Firmware
Wago 750-8204
Wago 750-8204 Firmware
Wago 750-8206
Wago 750-8206 Firmware
Wago 750-8207
Wago 750-8207 Firmware
Wago 750-8208
Wago 750-8208 Firmware
Wago 750-8210
Wago 750-8210 Firmware
Wago 750-8211
Wago 750-8211 Firmware
Wago 750-8212
Wago 750-8212 Firmware
Wago 750-8213
Wago 750-8213 Firmware
Wago 750-8214
Wago 750-8214 Firmware
Wago 750-8216
Wago 750-8216 Firmware
Wago 750-8217
Wago 750-8217 Firmware
CPEs cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*
cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*
Vendors & Products Wago
Wago 750-8202
Wago 750-8202 Firmware
Wago 750-8203
Wago 750-8203 Firmware
Wago 750-8204
Wago 750-8204 Firmware
Wago 750-8206
Wago 750-8206 Firmware
Wago 750-8207
Wago 750-8207 Firmware
Wago 750-8208
Wago 750-8208 Firmware
Wago 750-8210
Wago 750-8210 Firmware
Wago 750-8211
Wago 750-8211 Firmware
Wago 750-8212
Wago 750-8212 Firmware
Wago 750-8213
Wago 750-8213 Firmware
Wago 750-8214
Wago 750-8214 Firmware
Wago 750-8216
Wago 750-8216 Firmware
Wago 750-8217
Wago 750-8217 Firmware

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T04:10:03.625Z

Reserved: 2021-06-10T00:00:00

Link: CVE-2021-34593

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2021-10-26T10:15:08.013

Modified: 2025-08-15T20:25:58.247

Link: CVE-2021-34593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.