First published: Mon Feb 27 2023(Updated: )
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wago 751-9301 Firmware | >=16<22 | |
Wago 751-9301 Firmware | =22 | |
Wago 751-9301 Firmware | =23 | |
Wago 751-9301 | ||
Wago 752-8303\/8000-002 Firmware | >=18<22 | |
Wago 752-8303\/8000-002 Firmware | =22 | |
Wago 752-8303\/8000-002 Firmware | =23 | |
Wago 752-8303\/8000-002 | ||
WAGO PFC100 Firmware | >=16<22 | |
WAGO PFC100 Firmware | =22 | |
WAGO PFC100 Firmware | =23 | |
WAGO PFC100 | ||
WAGO PFC200 Firmware | >=16<22 | |
WAGO PFC200 Firmware | =22 | |
WAGO PFC200 Firmware | =23 | |
WAGO PFC200 | ||
Wago Touch Panel 600 Advanced Firmware | >=16<22 | |
Wago Touch Panel 600 Advanced Firmware | =22 | |
Wago Touch Panel 600 Advanced Firmware | =23 | |
Wago Touch Panel 600 Advanced | ||
Wago Touch Panel 600 Marine Firmware | >=16<22 | |
Wago Touch Panel 600 Marine Firmware | =22 | |
Wago Touch Panel 600 Marine Firmware | =23 | |
Wago Touch Panel 600 Marine | ||
Wago Touch Panel 600 Standard Firmware | >=16<22 | |
Wago Touch Panel 600 Standard Firmware | =22 | |
Wago Touch Panel 600 Standard Firmware | =23 | |
Wago Touch Panel 600 Standard |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45138 is a vulnerability in the configuration backend of the web-based management of WAGO devices.
Unauthenticated users can exploit CVE-2022-45138 by accessing the configuration backend and reading/setting device parameters.
The severity of CVE-2022-45138 is critical with a CVSS score of 9.8.
WAGO devices with firmware versions 16 to 22 are affected by CVE-2022-45138.
You can find more information about CVE-2022-45138 at the following link: [VDE-2022-060 Advisory](https://cert.vde.com/en/advisories/VDE-2022-060/).