Summary
Multiple vulnerabilities in the WAGO I/O-Check Service were reported.
Impact
By exploiting the described vulnerabilities, the attacker potentially is able to manipulate or disrupt the device.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
752-8303/8000-0002 | Hardware Edge Controller | Firmware <=FW18Patch2 |
750-81xx/xxx-xxx | Hardware PFC 100 | Firmware <=FW18Patch2 |
750-82xx/xxx-xxx | Hardware PFC200 | Firmware <=FW18Patch2 |
762-6xxx, 762-5xxx, 762-4xxx | Hardware Touch Panel 600 | Firmware <=FW18Patch2 |
Vulnerabilities
Expand / Collapse allIn WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service.
Mitigation
- Disable I/O-Check service
- Restrict network access to the device.
- Do not directly connect the device to the internet.
Revision History
Version | Date | Summary |
---|---|---|
1 | 06/29/2021 12:00 | Initial revision. |
2 | 11/06/2024 12:27 | Fix: added self-reference |
3 | 02/12/2025 17:48 | Fix: corrected self-reference, fixed version |
4 | 04/10/2025 15:00 | Fixed csaf publisher information |
5 | 05/14/2025 15:00 | Fix: added distribution |