CVE-2021-34567: CWE-125 Out-of-bounds Read in WAGO 750-81xx/xxx-xxxFW
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
AI Analysis
Technical Summary
CVE-2021-34567 is a high-severity vulnerability identified in the WAGO 750-81xx/xxx-xxxFW series, specifically affecting the WAGO I/O-Check Service. This vulnerability is classified as a CWE-125 Out-of-bounds Read, which occurs when the software reads data outside the bounds of allocated memory. The flaw allows an unauthenticated remote attacker to send specially crafted packets containing operating system commands to the vulnerable service. Exploitation of this vulnerability can provoke a denial of service (DoS) condition by causing the affected device to crash or become unresponsive. Additionally, the out-of-bounds read may lead to limited information disclosure, potentially leaking sensitive memory contents. The vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 8.2, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects availability, with a limited impact on confidentiality, and no impact on integrity. The affected product is firmware version FW1 of the WAGO 750-81xx/xxx-xxxFW series, which is commonly used in industrial automation and control systems (ICS) environments. No known exploits have been reported in the wild, and no patches or mitigation links are currently provided by the vendor, indicating that affected organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. WAGO devices are widely deployed in European industrial environments for process control and monitoring. A successful exploitation could lead to denial of service conditions, disrupting operational technology (OT) systems and potentially halting production lines or critical infrastructure operations. The limited out-of-bounds read may also expose sensitive information that could aid further attacks. Given the unauthenticated and remote nature of the exploit, attackers could leverage this vulnerability to cause operational disruptions without needing prior access or credentials. This could have cascading effects on supply chains and critical services, especially in sectors with high reliance on WAGO devices. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices within dedicated OT network segments, restricting access only to trusted management systems and monitoring devices. 2. Access Control Lists (ACLs): Implement strict firewall rules to block unauthorized inbound traffic to the WAGO I/O-Check Service ports from untrusted networks, especially the internet. 3. Intrusion Detection and Prevention: Deploy network-based IDS/IPS solutions configured to detect anomalous packets or command injection attempts targeting WAGO devices. 4. Monitoring and Logging: Enable detailed logging on network gateways and OT management systems to detect unusual traffic patterns or repeated connection attempts to the vulnerable service. 5. Vendor Engagement: Maintain close contact with WAGO for updates on patches or firmware upgrades addressing this vulnerability and plan for timely deployment once available. 6. Incident Response Preparedness: Develop and test response plans for potential DoS incidents affecting OT systems to minimize downtime and operational impact. 7. Device Hardening: Disable or restrict unnecessary services on WAGO devices if possible, reducing the attack surface. 8. Physical Security: Ensure physical access to WAGO devices is controlled to prevent local exploitation or tampering.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Poland, Czech Republic, Austria, Sweden, Finland
CVE-2021-34567: CWE-125 Out-of-bounds Read in WAGO 750-81xx/xxx-xxxFW
Description
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
AI-Powered Analysis
Technical Analysis
CVE-2021-34567 is a high-severity vulnerability identified in the WAGO 750-81xx/xxx-xxxFW series, specifically affecting the WAGO I/O-Check Service. This vulnerability is classified as a CWE-125 Out-of-bounds Read, which occurs when the software reads data outside the bounds of allocated memory. The flaw allows an unauthenticated remote attacker to send specially crafted packets containing operating system commands to the vulnerable service. Exploitation of this vulnerability can provoke a denial of service (DoS) condition by causing the affected device to crash or become unresponsive. Additionally, the out-of-bounds read may lead to limited information disclosure, potentially leaking sensitive memory contents. The vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 8.2, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects availability, with a limited impact on confidentiality, and no impact on integrity. The affected product is firmware version FW1 of the WAGO 750-81xx/xxx-xxxFW series, which is commonly used in industrial automation and control systems (ICS) environments. No known exploits have been reported in the wild, and no patches or mitigation links are currently provided by the vendor, indicating that affected organizations must rely on other defensive measures until an official fix is released.
Potential Impact
For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. WAGO devices are widely deployed in European industrial environments for process control and monitoring. A successful exploitation could lead to denial of service conditions, disrupting operational technology (OT) systems and potentially halting production lines or critical infrastructure operations. The limited out-of-bounds read may also expose sensitive information that could aid further attacks. Given the unauthenticated and remote nature of the exploit, attackers could leverage this vulnerability to cause operational disruptions without needing prior access or credentials. This could have cascading effects on supply chains and critical services, especially in sectors with high reliance on WAGO devices. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.
Mitigation Recommendations
1. Network Segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices within dedicated OT network segments, restricting access only to trusted management systems and monitoring devices. 2. Access Control Lists (ACLs): Implement strict firewall rules to block unauthorized inbound traffic to the WAGO I/O-Check Service ports from untrusted networks, especially the internet. 3. Intrusion Detection and Prevention: Deploy network-based IDS/IPS solutions configured to detect anomalous packets or command injection attempts targeting WAGO devices. 4. Monitoring and Logging: Enable detailed logging on network gateways and OT management systems to detect unusual traffic patterns or repeated connection attempts to the vulnerable service. 5. Vendor Engagement: Maintain close contact with WAGO for updates on patches or firmware upgrades addressing this vulnerability and plan for timely deployment once available. 6. Incident Response Preparedness: Develop and test response plans for potential DoS incidents affecting OT systems to minimize downtime and operational impact. 7. Device Hardening: Disable or restrict unnecessary services on WAGO devices if possible, reducing the attack surface. 8. Physical Security: Ensure physical access to WAGO devices is controlled to prevent local exploitation or tampering.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2021-06-10T19:19:08.023Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbecc7d
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 6/25/2025, 6:57:06 PM
Last updated: 2/3/2026, 9:49:29 AM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8461: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Seres Software syWEB
HighCVE-2025-8456: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Kod8 Software Technologies Trade Ltd. Co. Kod8 Individual and SME Website
HighCVE-2024-34021: Unrestricted upload of file with dangerous type in ELECOM CO.,LTD. WRC-1167GST2
MediumCVE-2024-25579: OS command injection in ELECOM CO.,LTD. WRC-1167GS2-B
MediumCVE-2026-1592: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.