Back to overview

WAGO: Multiple Vulnerabilities in I/O-Check Service

VDE-2020-036
Last update
05/14/2025 15:00
Published at
06/29/2021 12:00
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2020-036
CSAF Document

Summary

Multiple vulnerabilities in the WAGO I/O-Check Service were reported.

Impact

By exploiting the described vulnerabilities, the attacker potentially is able to manipulate or disrupt the device.

Affected Product(s)

Model no. Product name Affected versions
752-8303/8000-0002 Hardware Edge Controller Firmware <=FW18Patch2
750-81xx/xxx-xxx Hardware PFC 100 Firmware <=FW18Patch2
750-82xx/xxx-xxx Hardware PFC200 Firmware <=FW18Patch2
762-6xxx, 762-5xxx, 762-4xxx Hardware Touch Panel 600 Firmware <=FW18Patch2

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Out-of-bounds Write (CWE-787)
Summary

In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

References

Published
09/22/2025 14:58
Weakness
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (CWE-120)
Summary

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.

References

Published
09/22/2025 14:58
Weakness
Out-of-bounds Read (CWE-125)
Summary

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.

References

Published
09/22/2025 14:58
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
Summary

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

References

Mitigation

  • Disable I/O-Check service
  • Restrict network access to the device.
  • Do not directly connect the device to the internet.

Revision History

Version Date Summary
1 06/29/2021 12:00 Initial revision.
2 11/06/2024 12:27 Fix: added self-reference
3 02/12/2025 17:48 Fix: corrected self-reference, fixed version
4 04/10/2025 15:00 Fixed csaf publisher information
5 05/14/2025 15:00 Fix: added distribution