ID

VAR-202110-1969


CVE

CVE-2021-34567


TITLE

plural  WAGO  Product out-of-bounds read vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-020495

DESCRIPTION

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read. 750-8100 firmware, 750-8101 firmware, 750-8101/025-000 firmware etc. WAGO The product contains an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state

Trust: 1.62

sources: NVD: CVE-2021-34567 // JVNDB: JVNDB-2021-020495

AFFECTED PRODUCTS

vendor:wagomodel:750-8202\/025-000scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4103scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4102scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4202\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-012scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6202\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/040-000scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4201\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6204\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-011scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6303\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-5205\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4305\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6302\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4206\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-012scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6202\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5203\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/025-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6303\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4204\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/040-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5306\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6302\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/025-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-011scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4104scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4101scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6201\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4302\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5303\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:752-8303\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4203\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4206\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5304\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8101\/025-000scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6203\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4202\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/040-000scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6204\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4205\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4305\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6301\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8101scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8102scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-5204\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5203\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-022scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8100scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4204\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/025-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4104scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4302\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8102scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8102\/025-000scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4203\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8101\/025-000scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4303\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4306\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5304\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6203\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/040-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4103scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4101scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4304\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-5305\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6301\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-5206\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4301\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4205\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4205\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/025-000scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8101scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8102\/025-000scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4206\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4201\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5204\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6304\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/000-022scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-5205\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-6304\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:750-8100scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4304\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4205\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4206\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-4102scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4303\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4306\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202\/025-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5306\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5305\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-6201\/8000-001scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5303\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:752-8303\/8000-002scope:ltversion:18

Trust: 1.0

vendor:wagomodel:762-5206\/8000-001scope:eqversion:18

Trust: 1.0

vendor:wagomodel:762-4301\/8000-002scope:eqversion:18

Trust: 1.0

vendor:wagomodel:750-8202/000-012scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8102scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8202/025-000scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8101/025-000scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8100scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8101scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8202/000-011scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8102/025-000scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8202scope: - version: -

Trust: 0.8

vendor:wagomodel:750-8202/000-022scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-020495 // NVD: CVE-2021-34567

CVSS

SEVERITY

CVSSV2

CVSSV3

info@cert.vde.com: CVE-2021-34567
value: HIGH

Trust: 1.0

OTHER: JVNDB-2021-020495
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202211-2420
value: HIGH

Trust: 0.6

info@cert.vde.com: CVE-2021-34567
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.2
version: 3.1

Trust: 1.0

OTHER: JVNDB-2021-020495
baseSeverity: HIGH
baseScore: 8.2
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2021-020495 // CNNVD: CNNVD-202211-2420 // NVD: CVE-2021-34567

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.0

problemtype:Out-of-bounds read (CWE-125) [ others ]

Trust: 0.8

sources: JVNDB: JVNDB-2021-020495 // NVD: CVE-2021-34567

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202211-2420

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202211-2420

PATCH

title:WAGO Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=213540

Trust: 0.6

title:cve-2021-34567url:https://github.com/hu185396/cve-2021-34567

Trust: 0.1

sources: VULMON: CVE-2021-34567 // CNNVD: CNNVD-202211-2420

EXTERNAL IDS

db:NVDid:CVE-2021-34567

Trust: 3.3

db:CERT@VDEid:VDE-2020-036

Trust: 2.4

db:JVNDBid:JVNDB-2021-020495

Trust: 0.8

db:CNNVDid:CNNVD-202211-2420

Trust: 0.6

db:VULMONid:CVE-2021-34567

Trust: 0.1

sources: VULMON: CVE-2021-34567 // JVNDB: JVNDB-2021-020495 // CNNVD: CNNVD-202211-2420 // NVD: CVE-2021-34567

REFERENCES

url:https://cert.vde.com/en/advisories/vde-2020-036/

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-34567

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2021-34567/

Trust: 0.6

url:https://github.com/hu185396/cve-2021-34567

Trust: 0.1

sources: VULMON: CVE-2021-34567 // JVNDB: JVNDB-2021-020495 // CNNVD: CNNVD-202211-2420 // NVD: CVE-2021-34567

SOURCES

db:VULMONid:CVE-2021-34567
db:JVNDBid:JVNDB-2021-020495
db:CNNVDid:CNNVD-202211-2420
db:NVDid:CVE-2021-34567

LAST UPDATE DATE

2024-08-14T14:02:14.299000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2021-020495date:2023-11-02T08:06:00
db:CNNVDid:CNNVD-202211-2420date:2022-11-10T00:00:00
db:NVDid:CVE-2021-34567date:2023-11-07T03:36:01.837

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2021-020495date:2023-11-02T00:00:00
db:CNNVDid:CNNVD-202211-2420date:2022-11-09T00:00:00
db:NVDid:CVE-2021-34567date:2022-11-09T16:15:11.703