Vulnerabilites related to wago - 751-9301_firmware
CVE-2022-22511 (GCVE-0-2022-22511)
Vulnerability from cvelistv5
Published
2022-03-09 19:38
Modified
2024-09-17 00:16
CWE
  • CWE-79 - Cross-site Scripting (XSS)
Summary
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.
References
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:14:55.300Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Compact Controller CC100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Series PFC100 (750-81xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Series PFC200 (750-82xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Series Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW16 FW22"
            }
          ]
        },
        {
          "product": "Series Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW16 FW22"
            }
          ]
        },
        {
          "product": "Series Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "status": "affected",
              "version": "FW16 FW22"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
        }
      ],
      "datePublic": "2022-03-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-09T19:38:43",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
        }
      ],
      "source": {
        "advisory": "VDE-2022-004",
        "defect": [
          "CERT@VDE#64068"
        ],
        "discovery": "EXTERNAL"
      },
      "title": "WAGO PLCs WBM vulnerable to reflected XSS",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "info@cert.vde.com",
          "DATE_PUBLIC": "2022-03-09T07:00:00.000Z",
          "ID": "CVE-2022-22511",
          "STATE": "PUBLIC",
          "TITLE": "WAGO PLCs WBM vulnerable to reflected XSS"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Compact Controller CC100 (751-9301)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Edge Controller (752-8303/8000-002)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Series PFC100 (750-81xx/xxx-xxx)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Series PFC200 (750-82xx/xxx-xxx)",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Series Touch Panel 600 Advanced Line (762-5xxx)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Series Touch Panel 600 Marine Line (762-6xxx)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Series Touch Panel 600 Standard Line (762-4xxx)",
                      "version": {
                        "version_data": [
                          {
                            "version_name": "FW16",
                            "version_value": "FW22"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "WAGO"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "These vulnerabilities were reported to WAGO by: Mohamed Magdy Abumuslim, coordination done by CERT@VDE."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://cert.vde.com/en/advisories/VDE-2022-004/",
              "refsource": "CONFIRM",
              "url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "Install FW \u003e=FW22 (FW22 planned for end of Q2/22)"
          }
        ],
        "source": {
          "advisory": "VDE-2022-004",
          "defect": [
            "CERT@VDE#64068"
          ],
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-22511",
    "datePublished": "2022-03-09T19:38:43.516457Z",
    "dateReserved": "2022-01-03T00:00:00",
    "dateUpdated": "2024-09-17T00:16:00.059Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-45140 (GCVE-0-2022-45140)
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2025-03-10 17:46
Severity ?
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:09:55.436Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-45140",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-10T17:46:43.476712Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-10T17:46:52.078Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 (750-81xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-82xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
            }
          ],
          "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-27T14:36:39.448Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#64160"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Missing Authentication for Critical Function ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-45140",
    "datePublished": "2023-02-27T14:36:39.448Z",
    "dateReserved": "2022-11-10T09:46:59.080Z",
    "dateUpdated": "2025-03-10T17:46:52.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-45138 (GCVE-0-2022-45138)
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2025-03-10 17:20
Severity ?
CWE
  • CWE-306 - Missing Authentication for Critical Function
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:09:55.415Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-45138",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-10T17:20:33.215201Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-10T17:20:50.798Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW18",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 (750-81xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-82xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
            }
          ],
          "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-115",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-115 Authentication Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-306",
              "description": "CWE-306 Missing Authentication for Critical Function",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-27T14:36:20.474Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#64160"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Missing Authentication for Critical Function",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-45138",
    "datePublished": "2023-02-27T14:36:20.474Z",
    "dateReserved": "2022-11-10T09:46:59.079Z",
    "dateUpdated": "2025-03-10T17:20:50.798Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-3281 (GCVE-0-2022-3281)
Vulnerability from cvelistv5
Published
2022-10-17 08:20
Modified
2025-05-10 02:56
CWE
  • CWE-440 - Expected Behavior Violation
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T01:07:06.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-3281",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-10T02:56:08.488527Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-05-10T02:56:32.932Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "750-81xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-8217/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.04.10(16)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "750-82xx/xxx-xxx Series PFC100/PFC200",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.08(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Compact Controller CC100",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.09.08(21)",
              "status": "affected",
              "version": "03.07.17(19)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-4xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-5xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "762-6xxx Series Touch Panel 600",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.01.07(13)",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "752-8303/8000-002 Edge Controller",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThanOrEqual": "03.10.09(22)",
              "status": "affected",
              "version": "03.06.09(18)",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-10-17T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-440",
              "description": "CWE-440 Expected Behavior Violation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-02T00:00:00.000Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
        }
      ],
      "source": {
        "advisory": "VDE-2022-042",
        "defect": [
          "CERT@VDE#64236"
        ],
        "discovery": "INTERNAL"
      },
      "title": "WAGO: multiple products - Loss of MAC-Address-Filtering after reboot",
      "x_generator": {
        "engine": "vulnogram 0.1.0-rc1"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-3281",
    "datePublished": "2022-10-17T08:20:12.389Z",
    "dateReserved": "2022-09-23T00:00:00.000Z",
    "dateUpdated": "2025-05-10T02:56:32.932Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-45137 (GCVE-0-2022-45137)
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2024-08-03 14:09
CWE
  • CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:09:56.545Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW18",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 (750-81xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-82xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
            }
          ],
          "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-27T14:36:03.411Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#64160"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Reflective Cross-Site Scripting",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-45137",
    "datePublished": "2023-02-27T14:36:03.411Z",
    "dateReserved": "2022-11-10T09:46:59.079Z",
    "dateUpdated": "2024-08-03T14:09:56.545Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-45139 (GCVE-0-2022-45139)
Vulnerability from cvelistv5
Published
2023-02-27 14:36
Modified
2025-03-10 17:46
CWE
  • CWE-346 - Origin Validation Error
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:09:55.406Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-45139",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-10T17:45:54.261351Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-10T17:46:16.888Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Compact Controller CC100 (751-9301)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Edge Controller (752-8303/8000-002)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW18",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC100 (750-81xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "PFC200 (750-82xx/xxx-xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Advanced Line (762-5xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Marine Line (762-6xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Touch Panel 600 Standard Line (762-4xxx)",
          "vendor": "WAGO",
          "versions": [
            {
              "lessThan": "FW22",
              "status": "affected",
              "version": "FW16",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "FW22 Patch 1"
            },
            {
              "status": "affected",
              "version": "FW23"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
            }
          ],
          "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-554",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-554 Functionality Bypass"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-346",
              "description": "CWE-346 Origin Validation Error",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-02-27T14:36:32.016Z",
        "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
        "shortName": "CERTVDE"
      },
      "references": [
        {
          "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
        }
      ],
      "source": {
        "defect": [
          "CERT@VDE#64160"
        ],
        "discovery": "UNKNOWN"
      },
      "title": "WAGO: Origin validation error through CORS misconfiguration",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c",
    "assignerShortName": "CERTVDE",
    "cveId": "CVE-2022-45139",
    "datePublished": "2023-02-27T14:36:32.016Z",
    "dateReserved": "2022-11-10T09:46:59.080Z",
    "dateUpdated": "2025-03-10T17:46:16.888Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
              "versionEndExcluding": "22",
              "versionStartIncluding": "18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device."
    }
  ],
  "id": "CVE-2022-45138",
  "lastModified": "2024-11-21T07:28:49.880",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "info@cert.vde.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-27T15:15:11.317",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Summary
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
              "versionEndExcluding": "22",
              "versionStartIncluding": "18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability."
    }
  ],
  "id": "CVE-2022-45137",
  "lastModified": "2024-11-21T07:28:49.723",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "info@cert.vde.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-27T15:15:11.203",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-03-09 20:15
Modified
2024-11-21 06:46
Summary
Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9769E19F-647E-4D9D-8EE2-6EF904791975",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C4EEF3-EB06-4A8E-9BB2-0FE0AC3A6B7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB98C15-94A8-47C5-A84E-6AA18E7CF649",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3111C2A1-CABC-42BF-9EB1-66667A7269C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "349C3E37-19E3-4B31-912F-89FCA6DFA5F2",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A409E2AA-49AC-4967-8984-070FC9AD06E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "203DDFEB-EA37-47FB-8F64-351447C98029",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B584298-D794-4C1F-9C53-EECE772A82CF",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B02096-81A5-4823-94F3-D87F389397DE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4205\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55343A61-9614-4D8A-ACE4-4A211890087F",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4205\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2569546-AC58-420F-8FE6-90BA904DF6AF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4206\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D438FEE4-B4E9-4331-8372-CFE1E09FF18D",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4206\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C88834C9-E823-4B11-91D2-8E2264D5E3D2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC74498C-E578-4ACF-8CF9-475A13D6966C",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4305\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6C67678-4BC4-417A-AD6E-FB60B0F7A384",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC72ABF2-808D-4489-B484-23A414572CBF",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4306\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "082B2ECB-179E-4DE9-856F-EDDBB42AF318",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29641D55-A6FC-4DF0-9835-EFC602E80824",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B53684-BFE1-4100-9624-A034119E7CAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8BE1648-BB62-48FA-B640-448DE9FFFCB9",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD7B74F-71F9-4B0F-A9EB-EEA6FBEF81FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F52DE71F-A806-4134-A68A-08BCECE4D025",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91554389-BCF9-48EB-B198-A192BAE6206D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B13A1069-E504-4E82-9663-4F5E3CC2265D",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65CA42E-371C-407C-84F9-64AC3F02FFE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4844CF1-908E-4512-97E4-3D414771BD19",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "742F9265-3770-4B4E-A327-2202E2DAEA84",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC84C72E-1CC6-4BE0-8739-3771D92BD9FA",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FDB659-7FF2-4272-9818-3517AC55BFFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A25CB9B-B3DD-401C-9C6C-8BC4B3C65182",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7E5506-BA01-4B6F-9475-3F2056019858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "832CEF06-63A6-4B75-BE74-5B3317AE1D40",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8E97AD-B5B4-4F54-A8B8-52E83F34C33D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B6D5661-EA0E-4547-AF7E-FCE892F350F6",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12E0BDFB-A3EF-40A6-8561-D00A7E730AFC",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-82_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79536E94-5490-48BD-B69C-CB45CF566466",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B473F98C-E92B-4101-8BCF-1644AD7DE086",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "716CF02C-2B1B-4D4B-BFBF-025B5C2E47DB",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70FFC025-A170-466D-8BA5-C377CFA3589B",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9EA990-BC71-4141-9C18-DE3F8CDAFD2F",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5B99800-C5E6-4001-BCBA-2DB5E3CF7D8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EB4611-4028-4360-9E29-A44E16AF7311",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC647C3-A602-412F-A4DA-5ED092E2779C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9223E3-B708-40BA-A811-A03F614056B3",
              "versionEndExcluding": "fw22",
              "versionStartIncluding": "fw16",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Various configuration pages of the device are vulnerable to reflected XSS (Cross-Site Scripting) attacks. An authorized attacker with user privileges may use this to gain access to confidential information on a PC that connects to the WBM after it has been compromised."
    },
    {
      "lang": "es",
      "value": "Varias p\u00e1ginas de configuraci\u00f3n del dispositivo son vulnerables a ataques de tipo XSS (Cross-Site Scripting) reflejados. Un atacante autorizado con privilegios de usuario puede usar esto para conseguir acceso a informaci\u00f3n confidencial en un PC que sea conectado al WBM despu\u00e9s de haber sido comprometido"
    }
  ],
  "id": "CVE-2022-22511",
  "lastModified": "2024-11-21T06:46:55.623",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "info@cert.vde.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-03-09T20:15:08.367",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-004/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Severity ?
Summary
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
              "versionEndExcluding": "22",
              "versionStartIncluding": "18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise."
    }
  ],
  "id": "CVE-2022-45140",
  "lastModified": "2024-11-21T07:28:50.143",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "info@cert.vde.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-27T15:15:11.503",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-10-17 09:15
Modified
2024-11-21 07:19
Summary
WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter.
Impacted products
Vendor Product Version
wago 750-8100_firmware *
wago 750-8100 -
wago 750-8101_firmware *
wago 750-8101 -
wago 750-8101\/000-010_firmware *
wago 750-8101\/000-010 -
wago 750-8101\/025-000_firmware *
wago 750-8101\/025-000 -
wago 750-8102_firmware *
wago 750-8102 -
wago 750-8102\/025-000_firmware *
wago 750-8102\/025-000 -
wago 750-8202\/000-011_firmware *
wago 750-8202\/000-011 -
wago 750-8202\/000-012_firmware *
wago 750-8202\/000-012 -
wago 750-8202\/000-022_firmware *
wago 750-8202\/000-022 -
wago 750-8206_firmware *
wago 750-8206 -
wago 750-8206\/025-000_firmware *
wago 750-8206\/025-000 -
wago 750-8206\/025-001_firmware *
wago 750-8206\/025-001 -
wago 750-8207_firmware *
wago 750-8207 -
wago 750-8207\/025-000_firmware *
wago 750-8207\/025-000 -
wago 750-8207\/025-001_firmware *
wago 750-8207\/025-001 -
wago 750-8208_firmware *
wago 750-8208 -
wago 750-8208\/025-000_firmware *
wago 750-8208\/025-000 -
wago 750-8208\/025-001_firmware *
wago 750-8208\/025-001 -
wago 750-8210_firmware *
wago 750-8210 -
wago 750-8210\/025-000_firmware *
wago 750-8210\/025-000 -
wago 750-8211_firmware *
wago 750-8211 -
wago 750-8212_firmware *
wago 750-8212 -
wago 750-8212\/000-100_firmware *
wago 750-8212\/000-100 -
wago 750-8212\/025-000_firmware *
wago 750-8212\/025-000 -
wago 750-8212\/025-001_firmware *
wago 750-8212\/025-001 -
wago 750-8212\/025-002_firmware *
wago 750-8212\/025-002 -
wago 750-8213_firmware *
wago 750-8213 -
wago 750-8214_firmware *
wago 750-8214 -
wago 750-8215_firmware *
wago 750-8215 -
wago 750-8216_firmware *
wago 750-8216 -
wago 750-8216\/025-000_firmware *
wago 750-8216\/025-000 -
wago 750-8216\/025-001_firmware *
wago 750-8216\/025-001 -
wago 750-8202\/040-000_firmware *
wago 750-8202\/040-000 -
wago 750-8206\/040-000_firmware *
wago 750-8206\/040-000 -
wago 750-8206\/040-001_firmware *
wago 750-8206\/040-001 -
wago 750-8210\/040-000_firmware *
wago 750-8210\/040-000 -
wago 750-8211\/040-000_firmware *
wago 750-8211\/040-000 -
wago 750-8212\/040-000_firmware *
wago 750-8212\/040-000 -
wago 750-8212\/040-001_firmware *
wago 750-8212\/040-001 -
wago 750-8212\/040-010_firmware *
wago 750-8212\/040-010 -
wago 750-8213\/040-010_firmware *
wago 750-8213\/040-010 -
wago 750-8216\/040-000_firmware *
wago 750-8216\/040-000 -
wago 750-8217_firmware *
wago 750-8217 -
wago 750-8217\/025-000_firmware *
wago 750-8217\/025-000 -
wago 750-8217\/600-000_firmware *
wago 750-8217\/600-000 -
wago 750-8217\/625-000_firmware *
wago 750-8217\/625-000 -
wago 762-4201\/8000-001_firmware *
wago 762-4201\/8000-001 -
wago 762-4202\/8000-001_firmware *
wago 762-4202\/8000-001 -
wago 762-4203\/8000-001_firmware *
wago 762-4203\/8000-001 -
wago 762-4204\/8000-001_firmware *
wago 762-4204\/8000-001 -
wago 762-4205\/8000-001_firmware *
wago 762-4205\/8000-001 -
wago 762-4206\/8000-001_firmware *
wago 762-4206\/8000-001 -
wago 762-4301\/8000-002_firmware *
wago 762-4301\/8000-002 -
wago 762-4302\/8000-002_firmware *
wago 762-4302\/8000-002 -
wago 762-4303\/8000-002_firmware *
wago 762-4303\/8000-002 -
wago 762-4304\/8000-002_firmware *
wago 762-4304\/8000-002 -
wago 762-4101_firmware *
wago 762-4101 -
wago 762-4102_firmware *
wago 762-4102 -
wago 762-4103_firmware *
wago 762-4103 -
wago 762-4104_firmware *
wago 762-4104 -
wago 762-5203\/8000-001_firmware *
wago 762-5203\/8000-001 -
wago 762-5204\/8000-001_firmware *
wago 762-5204\/8000-001 -
wago 762-5205\/8000-001_firmware *
wago 762-5205\/8000-001 -
wago 762-5206\/8000-001_firmware *
wago 762-5206\/8000-001 -
wago 762-5303\/8000-002_firmware *
wago 762-5303\/8000-002 -
wago 762-5304\/8000-002_firmware *
wago 762-5304\/8000-002 -
wago 762-5305\/8000-002_firmware *
wago 762-5305\/8000-002 -
wago 762-5306\/8000-002_firmware *
wago 762-5306\/8000-002 -
wago 762-6201\/8000-001_firmware *
wago 762-6201\/8000-001 -
wago 762-6202\/8000-001_firmware *
wago 762-6202\/8000-001 -
wago 762-6203\/8000-001_firmware *
wago 762-6203\/8000-001 -
wago 762-6204\/8000-001_firmware *
wago 762-6204\/8000-001 -
wago 762-6301\/8000-002_firmware *
wago 762-6301\/8000-002 -
wago 762-6302\/8000-002_firmware *
wago 762-6302\/8000-002 -
wago 762-6303\/8000-002_firmware *
wago 762-6303\/8000-002 -
wago 762-6304\/8000-002_firmware *
wago 762-6304\/8000-002 -
wago 752-8303\/8000-002_firmware *
wago 752-8303\/8000-002 -
wago 751-9301_firmware *
wago 751-9301 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5DC6250-0E32-4B35-9339-14B550F5C19D",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C4EEF3-EB06-4A8E-9BB2-0FE0AC3A6B7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8101_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB987BB3-354A-4B63-98EE-1061DDC0F39A",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3111C2A1-CABC-42BF-9EB1-66667A7269C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8101\\/000-010_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4ED14F5F-2CB1-4165-9DA1-21B1DFB9B4CB",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8101\\/000-010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C60D279-D336-4435-A690-10B6C764DA37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8101\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA25E3A5-CB36-400C-B665-65EE899706A1",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8101\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1E36F3-C876-4427-A19A-2CE099D46FB6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8102_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75C31EC7-C4B6-42A1-B207-4FF9DCFA4CFD",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8102:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A409E2AA-49AC-4967-8984-070FC9AD06E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8102\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9025BECB-EFF5-4F98-81FC-D2CFE9B5447F",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8102\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59142ED2-02A8-44B3-8F0F-9C106542F55A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/000-011_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CAE3784-D4AC-433A-A955-20E997A0D8C0",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/000-011:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B47DFA-BEAB-45F1-A590-14F229E8DF04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/000-012_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AF77F22-9B24-41C1-A82C-DDE1568AF146",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/000-012:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3D005CB-5D55-4142-8A5B-A005AC2FC239",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/000-022_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40206D46-606A-4D3E-AC13-A8324962E0D2",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/000-022:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38796792-5D69-41BA-84B8-792151B1FC6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29E844CC-B9F9-4F20-A895-013127FE1AA9",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E17ECC4-D7AE-485C-A2EF-4148817F9DB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8206\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04BA30E0-7660-4752-925B-42E251FCD36B",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8206\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6196935C-97E0-40A2-AF06-03CB72E40B0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8206\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "556CF4FE-0ADF-40A3-98BF-B6EBD21E4D38",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8206\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E2892D5-A691-48A9-ACC9-236A50E6A40E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C3C9906-9264-4BD1-881D-EE4029ED011F",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA98A0D9-B050-430B-96C5-15932438FD3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8207\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92892299-BC0D-4426-B263-E9BD5985567E",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8207\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F56DA20-D82B-48C7-B4AD-8534367E8D83",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8207\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB6BFEA3-19DA-48C0-8199-437D1E243D30",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8207\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C5C4BAD-7268-4367-A112-60E1A2EF6AF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF87C18-45CA-4D41-9AF2-F1F78030E7AE",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C86098FC-E63E-4676-8BA1-ADCA30795558",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8208\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA4017EE-2806-4976-AA6A-55761458903F",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8208\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FFE4FF4-4EE4-493F-A8CF-968215142EF4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8208\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CABC33A8-79DF-4057-8B31-82157C589324",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8208\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B32F6244-FB19-4629-BCAB-A544C031E4BA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5D8B1C2-CA67-4861-BB16-0C63FB785837",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E11758B-46C3-4E57-943A-C9C073AE5211",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8210\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "984E388B-01B4-449A-90F7-7083349D0333",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8210\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF7C8131-3BE2-4515-81F0-1C7644B622B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D09DDDAA-CC72-4376-8063-C28F8CA93C51",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5CD6B267-3E4B-4597-82A6-130D6F21C728",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4432B707-86E9-424B-B018-AD162E6D0EAB",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20BBC380-0F6E-4400-93AF-5B6CFEF00562",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/000-100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6B08DF7-D833-4B47-A94B-60FAA37BA5B9",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/000-100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F356952-B865-49D8-889C-0A696E754C96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F8144D3-78E4-4129-82E5-D45E78369A77",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "31B9A7B1-2457-44E7-9753-DC5828281892",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F818CC0-0E00-4B70-863D-E2D9F1966781",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EC1F538-875D-4337-A42E-A837173B30FF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/025-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1732E7F6-59AF-44E1-BABF-FF53EA0ABFFD",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/025-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A81CC3BB-60A3-451F-BC34-F1D03517B0E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24E22E32-203F-4EFE-B45B-EB4C01E471DA",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4969E8EB-EF09-47B9-8F03-37BB87CFD048",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D90E8E11-21C4-4DD8-84CC-E92FABC268DB",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "979A8E43-4285-4A7B-BB0B-E6888117862C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8215_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6833CDAD-CE68-4BD5-9249-615E3270E7D9",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8215:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "577EDC26-671C-4703-BBF0-FE93AFEA81E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8216_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6043375C-A893-4C6E-839E-D17EB307BF19",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8216:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B854F74-173E-4523-BBA7-8FF7A9B9880E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8216\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "857852B7-A725-496A-B518-634770BA2666",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8216\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAD81900-6337-4EB9-ABA5-836452AF3E59",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8216\\/025-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5FD30E2-6A83-410B-9B4D-F9FEFFCB2C42",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8216\\/025-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3ED9EED-726C-4217-ABFE-CE0DE8BB902E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8202\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "638DB5C9-CA27-45E9-BC25-67956A4ECC13",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8202\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "977A1B79-8D15-49D8-8C58-F7B1FFDF0E8D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8206\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "06D72826-1991-4DA7-85A6-E0A289AA8863",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8206\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49A39AFE-BC17-4A09-ABCE-271C2BB9AA07",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8206\\/040-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8453B287-3BAF-469D-A7F7-E08F43911A6C",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8206\\/040-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B851D224-DFC0-4D96-AE88-0B7AF75FBCD8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8210\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1C9E1F8-CA8B-4CC0-8FB9-755AC9ADE8E7",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8210\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "50421963-086D-4B34-BCDA-1EA971708B73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8211\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A8B55C-CC09-42E5-9CC5-A738D9A2F562",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8211\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4921C3E3-0ED0-4ECB-B791-BE3AE48D6F92",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0687A5-28D6-4A79-BFD5-CBE1AB2679BB",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26478046-3D53-45DB-B5B9-EE160383C9E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/040-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0BC04BB0-4DA5-4BAC-9ECD-21A3532ECFC4",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/040-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F94E5197-2913-488F-8E9C-AA14A4976726",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8212\\/040-010_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AA1D0FD-0CFB-4528-81BC-D16D1D24AB5C",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8212\\/040-010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF110184-7737-417A-8C9C-2F30FA8091C0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8213\\/040-010_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C3BF7F4-9D64-43AC-BBE8-BFA99C2369E6",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8213\\/040-010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "764647F1-F01F-42CD-94B6-D46494BDC1A0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8216\\/040-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "687EE280-9DED-4AA6-9EC8-0DF31F2209E2",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8216\\/040-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A56C1204-6939-4353-A917-5B3542A889D3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8217_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B11C662B-6FED-460F-A597-120510525B4F",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.04.10\\(16\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8217:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B23CD8FD-FC7A-4E24-BF8F-648478D82645",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8217\\/025-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89358BFC-290C-4C45-82E7-7CA0D634F9C4",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.04.10\\(16\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8217\\/025-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6494874B-DB89-4C9C-BF6E-EB775D19C6B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8217\\/600-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31DFB86E-3A92-4B31-9D31-E213971A7D39",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.04.10\\(16\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8217\\/600-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D733746C-0F1D-49CB-BB1A-E8409E891389",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:750-8217\\/625-000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A5994B-541D-49CA-BF2A-359AB380655C",
              "versionEndIncluding": "03.10.08\\(22\\)",
              "versionStartIncluding": "03.04.10\\(16\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:750-8217\\/625-000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4228ED9E-36C8-4F01-9447-D1D58C3BD6C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3AB078-2016-41A1-93CC-67CED757560C",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4201\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E54B6A-82B1-4AFA-BBA0-1998B5DE0BBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EACF93EA-FC9D-4DD4-B0D5-A8E2EBF9D1E7",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4202\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09484C17-CD67-44E3-BA2D-0F718D888B0F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59E0FBC-E98F-4BD5-81CB-BEF9F0DFEB62",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4203\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E5672E3-7B4C-4FAF-955E-04EEB9E5B210",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A70708-362F-4C08-8D25-9222F38C5C48",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4204\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C9E9B25-5C96-4665-9DC2-DD11905331AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACC0F28C-D8ED-4F1E-8126-00E3FF199184",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4205\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A646213B-FF88-4A28-91B8-E21BD3710DF1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B1496B0-06DC-45B8-9CDA-A58C0F0929DF",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4206\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39A1F780-B010-4C95-B1B8-3A2D34938223",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9831294A-79D7-4F95-9564-2DF721B80076",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4301\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD64BCDC-A7F2-4E8C-886D-C0D9268D0DA8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E808AA13-4095-480E-BE9D-4961DB901AC9",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4302\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FDBE05B-7ACB-4DB5-8D2F-7FCEC626E161",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53A52FF3-7FCF-453E-8553-E1743D8C2B2B",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A5421E8-67EA-4D0D-889F-A64DA70E7695",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF5E6BE-E751-4FE3-950C-A220B2966EE4",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4304\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB95678-6815-4FB6-AA22-E6FEC011B269",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4101_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49315880-9359-441F-8A91-66D39297B25E",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71684E3-7724-4662-B579-64BEE0EA9EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4102_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7833D5-E7D7-433C-978C-9A657ADABE99",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4102:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08B20B1D-FD2D-4C74-AE22-66C7FC4F126A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4103_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA3687EB-0725-48A2-8767-CAFAA4DB03D5",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4103:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B46B51E-5EB2-4D8D-B77E-00D1EBAF1429",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-4104_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A26B2C3-0D97-4AC9-A2E3-759645C92AB0",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-4104:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCAB7B7A-8081-4F8D-8304-E05FA68CE2F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C83BB3-41FA-417A-BF7B-2B29878C5D8C",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5203\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DBE3A7A-F96D-41B8-A150-BA5DC144DAA1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8828E6F6-256B-4886-9A09-203AE24591DF",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5204\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3EE3467-287E-4729-8C2B-3F43B92A49B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5205\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4748774-2371-4FB7-A44A-FEDC82FE35CF",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5205\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13B53684-BFE1-4100-9624-A034119E7CAA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5206\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F18C79-0D0B-4DA3-966D-0F8323871D2D",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5206\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CD7B74F-71F9-4B0F-A9EB-EEA6FBEF81FB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CEE9FD-D92E-41EC-AE19-67B1196AF441",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D4FF612-453D-4287-8989-2779A6F6A0A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7843674-EBC2-46E6-890E-E5FA46B5E6D0",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5304\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "80089A85-1174-4E47-BC36-69DD11A3FFF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5305\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D72E1BB-E04E-49CB-B35A-AF2BEC9110D4",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5305\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91554389-BCF9-48EB-B198-A192BAE6206D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-5306\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F43ABF1-DB17-4077-8628-12C04488DD2A",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-5306\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E65CA42E-371C-407C-84F9-64AC3F02FFE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6201\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D758DDD0-D1E4-46A1-89E3-438976D5B5BA",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6201\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2BEE4ED-2C15-4E52-8FEC-BB7B5742274F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6202\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65695E4D-56B8-4155-A87D-3D8E8936EF80",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6202\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF4E78EB-C91E-4E92-AF9F-90300EE96E03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6203\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37DA2954-1735-4339-91B0-9FD9A33E43EB",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6203\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F37AB-BFC5-49C2-B8FD-21AA0266C703",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6204\\/8000-001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9B5B522-DF06-4D7B-B61E-591DB7BEBE93",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6204\\/8000-001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "422F9EEC-8516-4692-93DE-BB0F385D2BD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6301\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B290C86-57A5-4875-9071-27F9ED66F77E",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6301\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "742F9265-3770-4B4E-A327-2202E2DAEA84",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6302\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2AC9B06-0691-4A18-B7EA-FA2FFFAB872D",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6302\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FDB659-7FF2-4272-9818-3517AC55BFFD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E370F98-3A05-41C7-B9CC-710B8DD57DDE",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E7E5506-BA01-4B6F-9475-3F2056019858",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:762-6304\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D2A6505-0352-43A7-94A3-DF69CA9F6CFD",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.01.07\\(13\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:762-6304\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E8E97AD-B5B4-4F54-A8B8-52E83F34C33D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85CC9336-F4D3-4463-8182-0A0AB9CA58D9",
              "versionEndIncluding": "03.10.09\\(22\\)",
              "versionStartIncluding": "03.06.09\\(18\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1994DE6D-FEAC-4F3E-8201-7661D0D18C6F",
              "versionEndIncluding": "03.09.08\\(21\\)",
              "versionStartIncluding": "03.07.17\\(19\\)",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller in multiple versions are prone to a loss of MAC-Address-Filtering after reboot. This may allow an remote attacker to circumvent the reach the network that should be protected by the MAC address filter."
    },
    {
      "lang": "es",
      "value": "WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100 and Edge Controller en varias versiones son propensos a perder el filtrado de direcciones MAC tras el reinicio. Esto puede permitir a un atacante remoto omitir el alcance de la red que deber\u00eda estar protegida por el filtro de direcciones MAC"
    }
  ],
  "id": "CVE-2022-3281",
  "lastModified": "2024-11-21T07:19:12.523",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "info@cert.vde.com",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-10-17T09:15:12.387",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-042/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-440"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-02-27 15:15
Modified
2024-11-21 07:28
Summary
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D694685C-2D87-4C94-9957-6B921E8836CF",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "E42B14D3-F36A-4213-8447-870E9FC60F48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:751-9301_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "84839593-47AD-47C1-8762-FAF10070BCAD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:751-9301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "385FE0DA-6383-4EF7-835A-055EB0D22EB8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4958E9ED-6410-4F34-B582-7532A7F3101C",
              "versionEndExcluding": "22",
              "versionStartIncluding": "18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "C4761AA7-B270-485C-B929-34384145DCBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:752-8303\\/8000-002_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B514966-03EE-4710-89C0-E8FE771E79CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:752-8303\\/8000-002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "915B0745-EB00-40AD-80BA-887EFB435901",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0044A0A-90FD-4C5E-B1F9-A7A0B9EF0BE8",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "4815DFF8-0CAE-4C85-9F5B-F64C12F43AB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc100_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C84D09E-A681-47F1-AC37-850BF6E47D01",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F636354-95A2-4B36-9666-1FA57F185432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF2D886-205E-46D2-80DA-2E594F867EE5",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "B876DC19-0523-41DB-8BD7-1ECC09FCFA01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:pfc200_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE108CD0-B451-4ED5-83A1-CCEAACC1B40C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:pfc200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "688A3248-7EAA-499D-A47C-A4D4900CDBD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE5248EE-90DF-446C-BC44-D5AF5EDB45A1",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "9A613D7C-29C0-4D4E-ACDA-15BBC6FF0104",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_advanced_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D06AC6E-2EB2-4ACB-A6CA-E7AB88540713",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_advanced:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8221861-7455-41D5-B310-6AEA822B46CF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF35303-B999-40FE-8DC1-C18243F13FE7",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "774CFF47-61B6-48F8-8E1F-E3DC215066AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_marine_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD092B48-C42A-409E-AC9C-F523AD654C1B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_marine:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DEFFBC-934D-43BE-92AE-25F8EE8C1E0A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B8C054D-F02F-48A0-85D0-DFF90E9C31BB",
              "versionEndExcluding": "22",
              "versionStartIncluding": "16",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:22:-:*:*:*:*:*:*",
              "matchCriteriaId": "FA7A911A-395A-4536-8756-83DB2F62899D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:wago:touch_panel_600_standard_firmware:23:*:*:*:*:*:*:*",
              "matchCriteriaId": "263C0C64-F5B4-43C3-BF26-AF24DFA74699",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:wago:touch_panel_600_standard:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6D7A44C-2D95-4F69-A7DB-435B0A6F9F03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."
    }
  ],
  "id": "CVE-2022-45139",
  "lastModified": "2024-11-21T07:28:50.013",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "info@cert.vde.com",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-02-27T15:15:11.407",
  "references": [
    {
      "source": "info@cert.vde.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://cert.vde.com/en/advisories/VDE-2022-060/"
    }
  ],
  "sourceIdentifier": "info@cert.vde.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-346"
        }
      ],
      "source": "info@cert.vde.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-346"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}