Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2021-21000

Summary
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
Published At-24 May, 2021 | 11:05
Updated At-16 Sep, 2024 | 18:43
Rejected At-
Credits

WAGO: PFC200 Denial of Service due to the number of connections to the runtime

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:CERTVDE
Assigner Org ID:270ccfa6-a436-4e77-922e-914ec3a9685c
Published At:24 May, 2021 | 11:05
Updated At:16 Sep, 2024 | 18:43
Rejected At:
▼CVE Numbering Authority (CNA)
WAGO: PFC200 Denial of Service due to the number of connections to the runtime

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

Affected Products
Vendor
WAGO
Product
Series PFC200 Controller
Versions
Affected
  • From 750-823 through FW07 (custom)
  • From 750-829 through FW14 (custom)
  • From 750-831/000-00x through FW14 (custom)
  • From 750-832/000-00x through FW06 (custom)
  • From 750-852 through FW14 (custom)
  • From 750-862 through FW07 (custom)
  • From 750-880/0xx-xxx through FW15 (custom)
  • From 750-881 through FW14 (custom)
  • From 750-882 through FW14 (custom)
  • From 750-885/0xx-xxx through FW14 (custom)
  • From 750-889 through FW14 (custom)
  • From 750-890/0xx-xxx through FW07 (custom)
  • From 750-891 through FW07 (custom)
  • From 750-893 through FW07 (custom)
Vendor
WAGO
Product
Series Ethernet Controller
Versions
Affected
  • From 750-8202/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8203/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8204/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8206/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8207/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8208/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8210/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8211/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8212/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8213/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8214/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8216/xxx-xxx before 03.06.19 (18) (custom)
  • From 750-8217/xxx-xxx before 03.06.19 (18) (custom)
Problem Types
TypeCWE IDDescription
CWECWE-770CWE-770 Allocation of Resources Without Limits or Throttling
Type: CWE
CWE ID: CWE-770
Description: CWE-770 Allocation of Resources Without Limits or Throttling
Metrics
VersionBase scoreBase severityVector
3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

WAGO recommends all effected users with CODESYS 2.3 Runtime PLCs to update to the firmware versions listed at https://cert.vde.com/en-us/advisories/vde-2021-014 in the solution paragraph.

Configurations

Workarounds

Use general security best practices to protect systems from local and network attacks. Do not allow direct access to the device from untrusted networks. Update to the latest firmware according to the table in chapter solutions.

Exploits

Credits

These vulnerabilities were reported by JSC Positive Technologies (Vyacheslav Moskvin, Anton Dorfman, Sergey Fedonin, Ivan Kurnakov, Denis Goryushev). Coordination done by CERT@VDE.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories/vde-2021-014
x_refsource_CONFIRM
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2021-014
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories/vde-2021-014
x_refsource_CONFIRM
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2021-014
Resource:
x_refsource_CONFIRM
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:info@cert.vde.com
Published At:24 May, 2021 | 11:15
Updated At:15 Aug, 2025 | 20:21

On WAGO PFC200 devices in different firmware versions with special crafted packets an attacker with network access to the device could cause a denial of service for the login service of the runtime.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.3MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Primary2.05.0MEDIUM
AV:N/AC:L/Au:N/C:N/I:N/A:P
Type: Secondary
Version: 3.1
Base score: 5.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Type: Primary
Version: 2.0
Base score: 5.0
Base severity: MEDIUM
Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CPE Matches

wago
wago
>>750-823_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-823>>-
cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*
wago
wago
>>750-829_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-829_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-829>>-
cpe:2.3:h:wago:750-829:-:*:*:*:*:*:*:*
wago
wago
>>750-831_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-831_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-831>>-
cpe:2.3:h:wago:750-831:-:*:*:*:*:*:*:*
wago
wago
>>750-832_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-832>>-
cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*
wago
wago
>>750-852_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-852_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-852>>-
cpe:2.3:h:wago:750-852:-:*:*:*:*:*:*:*
wago
wago
>>750-862_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-862>>-
cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*
wago
wago
>>750-880_firmware>>Versions before fw16(exclusive)
cpe:2.3:o:wago:750-880_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-880>>-
cpe:2.3:h:wago:750-880:-:*:*:*:*:*:*:*
wago
wago
>>750-881_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-881_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-881>>-
cpe:2.3:h:wago:750-881:-:*:*:*:*:*:*:*
wago
wago
>>750-882_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-882_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-882>>-
cpe:2.3:h:wago:750-882:-:*:*:*:*:*:*:*
wago
wago
>>750-885_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-885_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-885>>-
cpe:2.3:h:wago:750-885:-:*:*:*:*:*:*:*
wago
wago
>>750-889_firmware>>Versions before fw15(exclusive)
cpe:2.3:o:wago:750-889_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-889>>-
cpe:2.3:h:wago:750-889:-:*:*:*:*:*:*:*
wago
wago
>>750-890_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-890>>-
cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*
wago
wago
>>750-891_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-891>>-
cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*
wago
wago
>>750-893_firmware>>Versions before fw08(exclusive)
cpe:2.3:o:wago:750-893_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-893>>-
cpe:2.3:h:wago:750-893:-:*:*:*:*:*:*:*
wago
wago
>>750-8202_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8202_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8202>>-
cpe:2.3:h:wago:750-8202:-:*:*:*:*:*:*:*
wago
wago
>>750-8203_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8203_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8203>>-
cpe:2.3:h:wago:750-8203:-:*:*:*:*:*:*:*
wago
wago
>>750-8204_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8204_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8204>>-
cpe:2.3:h:wago:750-8204:-:*:*:*:*:*:*:*
wago
wago
>>750-8206_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8206_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8206>>-
cpe:2.3:h:wago:750-8206:-:*:*:*:*:*:*:*
wago
wago
>>750-8207_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8207_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8207>>-
cpe:2.3:h:wago:750-8207:-:*:*:*:*:*:*:*
wago
wago
>>750-8208_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8208_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8208>>-
cpe:2.3:h:wago:750-8208:-:*:*:*:*:*:*:*
wago
wago
>>750-8210_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8210_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8210>>-
cpe:2.3:h:wago:750-8210:-:*:*:*:*:*:*:*
wago
wago
>>750-8211_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8211_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8211>>-
cpe:2.3:h:wago:750-8211:-:*:*:*:*:*:*:*
wago
wago
>>750-8212_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8212_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8212>>-
cpe:2.3:h:wago:750-8212:-:*:*:*:*:*:*:*
wago
wago
>>750-8213_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8213_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8213>>-
cpe:2.3:h:wago:750-8213:-:*:*:*:*:*:*:*
wago
wago
>>750-8214_firmware>>Versions before 03.06.19_\(18\)(exclusive)
cpe:2.3:o:wago:750-8214_firmware:*:*:*:*:*:*:*:*
wago
wago
>>750-8214>>-
cpe:2.3:h:wago:750-8214:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-770Secondaryinfo@cert.vde.com
CWE-770Primarynvd@nist.gov
CWE ID: CWE-770
Type: Secondary
Source: info@cert.vde.com
CWE ID: CWE-770
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://cert.vde.com/en-us/advisories/vde-2021-014info@cert.vde.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2021-014af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2021-014
Source: info@cert.vde.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2021-014
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found