CVE-2021-34567: CWE-125 Out-of-bounds Read in WAGO 750-81xx/xxx-xxxFW
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
AI Analysis
Technical Summary
CVE-2021-34567 is a high-severity vulnerability identified in the WAGO 750-81xx/xxx-xxxFW series, specifically affecting the WAGO I/O-Check Service. This vulnerability is classified as a CWE-125 Out-of-bounds Read, which occurs when the software reads data outside the bounds of allocated memory. The flaw allows an unauthenticated remote attacker to send specially crafted packets containing operating system commands to the vulnerable service. Exploitation of this vulnerability can provoke a denial of service (DoS) condition by causing the affected device to crash or become unresponsive. Additionally, the out-of-bounds read may lead to limited information disclosure, potentially leaking sensitive memory contents. The vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 8.2, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects availability, with a limited impact on confidentiality, and no impact on integrity. The affected product is firmware version FW1 of the WAGO 750-81xx/xxx-xxxFW series, which is commonly used in industrial automation and control systems (ICS) environments. No known exploits have been reported in the wild, and no patches or mitigation links are currently provided by the vendor, indicating that affected organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. WAGO devices are widely deployed in European industrial environments for process control and monitoring. A successful exploitation could lead to denial of service conditions, disrupting operational technology (OT) systems and potentially halting production lines or critical infrastructure operations. The limited out-of-bounds read may also expose sensitive information that could aid further attacks. Given the unauthenticated and remote nature of the exploit, attackers could leverage this vulnerability to cause operational disruptions without needing prior access or credentials. This could have cascading effects on supply chains and critical services, especially in sectors with high reliance on WAGO devices. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices within dedicated OT network segments, restricting access only to trusted management systems and monitoring devices. 2. Access Control Lists (ACLs): Implement strict firewall rules to block unauthorized inbound traffic to the WAGO I/O-Check Service ports from untrusted networks, especially the internet. 3. Intrusion Detection and Prevention: Deploy network-based IDS/IPS solutions configured to detect anomalous packets or command injection attempts targeting WAGO devices. 4. Monitoring and Logging: Enable detailed logging on network gateways and OT management systems to detect unusual traffic patterns or repeated connection attempts to the vulnerable service. 5. Vendor Engagement: Maintain close contact with WAGO for updates on patches or firmware upgrades addressing this vulnerability and plan for timely deployment once available. 6. Incident Response Preparedness: Develop and test response plans for potential DoS incidents affecting OT systems to minimize downtime and operational impact. 7. Device Hardening: Disable or restrict unnecessary services on WAGO devices if possible, reducing the attack surface. 8. Physical Security: Ensure physical access to WAGO devices is controlled to prevent local exploitation or tampering.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Poland, Czech Republic, Austria, Sweden, Finland
CVE-2021-34567: CWE-125 Out-of-bounds Read in WAGO 750-81xx/xxx-xxxFW
Description
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
AI-Powered Analysis
Technical Analysis
CVE-2021-34567 is a high-severity vulnerability identified in the WAGO 750-81xx/xxx-xxxFW series, specifically affecting the WAGO I/O-Check Service. This vulnerability is classified as a CWE-125 Out-of-bounds Read, which occurs when the software reads data outside the bounds of allocated memory. The flaw allows an unauthenticated remote attacker to send specially crafted packets containing operating system commands to the vulnerable service. Exploitation of this vulnerability can provoke a denial of service (DoS) condition by causing the affected device to crash or become unresponsive. Additionally, the out-of-bounds read may lead to limited information disclosure, potentially leaking sensitive memory contents. The vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 8.2, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects availability, with a limited impact on confidentiality, and no impact on integrity. The affected product is firmware version FW1 of the WAGO 750-81xx/xxx-xxxFW series, which is commonly used in industrial automation and control systems (ICS) environments. No known exploits have been reported in the wild, and no patches or mitigation links are currently provided by the vendor, indicating that affected organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. WAGO devices are widely deployed in European industrial environments for process control and monitoring. A successful exploitation could lead to denial of service conditions, disrupting operational technology (OT) systems and potentially halting production lines or critical infrastructure operations. The limited out-of-bounds read may also expose sensitive information that could aid further attacks. Given the unauthenticated and remote nature of the exploit, attackers could leverage this vulnerability to cause operational disruptions without needing prior access or credentials. This could have cascading effects on supply chains and critical services, especially in sectors with high reliance on WAGO devices. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices within dedicated OT network segments, restricting access only to trusted management systems and monitoring devices. 2. Access Control Lists (ACLs): Implement strict firewall rules to block unauthorized inbound traffic to the WAGO I/O-Check Service ports from untrusted networks, especially the internet. 3. Intrusion Detection and Prevention: Deploy network-based IDS/IPS solutions configured to detect anomalous packets or command injection attempts targeting WAGO devices. 4. Monitoring and Logging: Enable detailed logging on network gateways and OT management systems to detect unusual traffic patterns or repeated connection attempts to the vulnerable service. 5. Vendor Engagement: Maintain close contact with WAGO for updates on patches or firmware upgrades addressing this vulnerability and plan for timely deployment once available. 6. Incident Response Preparedness: Develop and test response plans for potential DoS incidents affecting OT systems to minimize downtime and operational impact. 7. Device Hardening: Disable or restrict unnecessary services on WAGO devices if possible, reducing the attack surface. 8. Physical Security: Ensure physical access to WAGO devices is controlled to prevent local exploitation or tampering.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2021-06-10T19:19:08.023Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbecc7d
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 6/25/2025, 6:57:06 PM
Last updated: 8/1/2025, 5:07:14 AM
Views: 14
Related Threats
CVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.