Advisories

Für CVSS 2.0, 3.0 und 3.2
VDE-2020-005
Mai 22, 2025, 3:03 nachm.
The coupler's function could be inhibited by an attack.
VDE-2020-006
Mai 14, 2025, 2:28 nachm.
With special crafted requests it is possible to get sensitive information, in this case the password hashes, by measuring response delay. With a substantial amount of time this data can …
VDE-2020-011
Mai 22, 2025, 3:03 nachm.
An attacker needs an authorized login on the device in order to exploit the herein mentioned vulnerabilities. The reported vulnerabilities allow a local attacker with valid login credentials who is …
VDE-2020-010
März 9, 2020, 10:25 vorm.
An attacker needs an authorized login with administrative privileges on the device in order to exploit the herein mentioned vulnerability. The weakness allows an attacker which has admin privileges on …
VDE-2020-009
Mai 22, 2025, 3:03 nachm.
The firmware update package (WUP) is not signed entirely. The used password offers no additional security, it is just meant to protect from unintentional modifications of the WUP file. Thus …
VDE-2020-008
Mai 14, 2025, 2:53 nachm.
The Cloud Connectivity of the WAGO PLCs is used to connect the device with the cloud services from different providers. It also supports maintenance functionality with the firmware update function …
VDE-2020-007
März 9, 2020, 10:10 vorm.
The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for commissioning and update. The controller is an embedded device which has limited resources. The vulnerability described …
VDE-2020-004
Mai 14, 2025, 3:00 nachm.
The communication between e!Cockpit and the programmable logic controller is not encrypted. The broken cryptographic algorithm allows an attacker to decode the password for the e!Cockpit communication and with this …