Uncontrolled resource consumption in Series WAGO 750-3x/-8x products may allow an unauthenticated remote attacker to DoS the MODBUS server with specially crafted packets.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2023-005/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
Configuration 9 (hide)
AND |
|
Configuration 10 (hide)
AND |
|
Configuration 11 (hide)
AND |
|
Configuration 12 (hide)
AND |
|
Configuration 13 (hide)
AND |
|
Configuration 14 (hide)
AND |
|
Configuration 15 (hide)
AND |
|
Configuration 16 (hide)
AND |
|
Configuration 17 (hide)
AND |
|
Configuration 18 (hide)
AND |
|
History
02 Oct 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-772 |
06 Jul 2023, 18:58
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://cert.vde.com/en/advisories/VDE-2023-005/ - Third Party Advisory | |
CPE | cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-890\/025-002:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-832\/000-002_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-890\/025-000_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-363\/040-000:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-365\/040-010_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-890\/025-002_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-890\/040-000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-362\/000-001_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-364\/040-010_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-890\/040-000:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-365\/040-010:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-890\/025-001:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-890\/025-001_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-832\/000-002:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-364\/040-010:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-362\/000-001:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-363\/040-000_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-362\/040-000:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-890\/025-000:-:*:*:*:*:*:*:* cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:* cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:wago:750-362\/040-000_firmware:*:*:*:*:*:*:*:* |
26 Jun 2023, 13:02
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-26 07:15
Updated : 2024-10-02 06:15
NVD link : CVE-2023-1150
Mitre link : CVE-2023-1150
CVE.ORG link : CVE-2023-1150
JSON object : View
Products Affected
wago
- 750-363\/040-000
- 750-363_firmware
- 750-362\/040-000_firmware
- 750-832_firmware
- 750-363
- 750-890\/025-002
- 750-890\/040-000
- 750-362
- 750-891
- 750-891_firmware
- 750-832
- 750-890\/025-001_firmware
- 750-365\/040-010
- 750-362\/000-001_firmware
- 750-364\/040-010
- 750-832\/000-002
- 750-362_firmware
- 750-893_firmware
- 750-823_firmware
- 750-823
- 750-364\/040-010_firmware
- 750-890
- 750-890\/025-001
- 750-832\/000-002_firmware
- 750-893
- 750-890\/040-000_firmware
- 750-862
- 750-862_firmware
- 750-362\/040-000
- 750-363\/040-000_firmware
- 750-890_firmware
- 750-890\/025-000
- 750-890\/025-000_firmware
- 750-890\/025-002_firmware
- 750-365\/040-010_firmware
- 750-362\/000-001
CWE
CWE-772
Missing Release of Resource after Effective Lifetime