First published: Tue May 07 2019(Updated: )
The Web-GUI on WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices has undocumented service access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO 750-830 firmware | <06 | |
WAGO 750-830 firmware | ||
WAGO 750-849 firmware | <08 | |
WAGO 750-849 firmware | ||
WAGO Ethernet Firmware | <11 | |
WAGO 750-871 firmware | ||
WAGO Ethernet Firmware | <07 | |
WAGO 750-872 firmware | ||
WAGO 750-873 firmware | <07 | |
WAGO 750-873 firmware | ||
WAGO 750-330 | <14 | |
WAGO 750-330 firmware | ||
WAGO 750-352 firmware | <14 | |
WAGO 750-352 firmware | ||
WAGO 750-829 firmware | <14 | |
WAGO 750-829 firmware | ||
WAGO Ethernet Firmware | <14 | |
WAGO 750-831 firmware | ||
WAGO 750-852 firmware | <14 | |
WAGO 750-xxx series firmware | ||
WAGO 750-880/040-000 firmware | <14 | |
WAGO 750-880/040-000 | ||
WAGO Ethernet Firmware | <14 | |
WAGO 750-881 firmware | ||
WAGO 750-882 firmware | <14 | |
WAGO 750-882 firmware | ||
WAGO 750-884 firmware | <14 | |
WAGO 750-884 firmware | ||
WAGO 750-885 firmware | <14 | |
WAGO 750-885 firmware | ||
WAGO 750-889 firmware | <14 | |
WAGO 750-889 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-10712 is a vulnerability found in the Web-GUI on WAGO Series 750-88x and Series 750-87x devices, which allows undocumented service access.
CVE-2019-10712 has a severity score of 9.8, making it a critical vulnerability.
CVE-2019-10712 affects WAGO Series 750-88x (750-330, 750-352, 750-829, 750-831, 750-852, 750-880, 750-881, 750-882, 750-884, 750-885, 750-889) and Series 750-87x (750-830, 750-849, 750-871, 750-872, 750-873) devices.
To fix CVE-2019-10712, it is recommended to apply the latest firmware updates provided by WAGO.
More information about CVE-2019-10712 can be found at the following references: [1] http://www.securityfocus.com/bid/108482, [2] https://cert.vde.com/de-de/advisories/vde-2019-008, [3] https://lists.apache.org/thread.html/r0066c1e862613de402fee04e81cbe00bcd64b64a2711beb9a13c3b25@%3Ccommits.cassandra.apache.org%3E