Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2021-34567: CWE-125 Out-of-bounds Read in WAGO 750-81xx/xxx-xxxFW

0
High
VulnerabilityCVE-2021-34567cvecve-2021-34567cwe-125
Published: Wed Nov 09 2022 (11/09/2022, 15:17:23 UTC)
Source: CVE
Vendor/Project: WAGO
Product: 750-81xx/xxx-xxxFW

Description

In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.

AI-Powered Analysis

AILast updated: 06/25/2025, 18:57:06 UTC

Technical Analysis

CVE-2021-34567 is a high-severity vulnerability identified in the WAGO 750-81xx/xxx-xxxFW series, specifically affecting the WAGO I/O-Check Service. This vulnerability is classified as a CWE-125 Out-of-bounds Read, which occurs when the software reads data outside the bounds of allocated memory. The flaw allows an unauthenticated remote attacker to send specially crafted packets containing operating system commands to the vulnerable service. Exploitation of this vulnerability can provoke a denial of service (DoS) condition by causing the affected device to crash or become unresponsive. Additionally, the out-of-bounds read may lead to limited information disclosure, potentially leaking sensitive memory contents. The vulnerability requires no authentication or user interaction, and can be triggered remotely over the network, making it highly accessible to attackers. The CVSS v3.1 base score is 8.2, reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact primarily affects availability, with a limited impact on confidentiality, and no impact on integrity. The affected product is firmware version FW1 of the WAGO 750-81xx/xxx-xxxFW series, which is commonly used in industrial automation and control systems (ICS) environments. No known exploits have been reported in the wild, and no patches or mitigation links are currently provided by the vendor, indicating that affected organizations must rely on other defensive measures until an official fix is released.

Potential Impact

For European organizations, particularly those operating in industrial automation, manufacturing, energy, and critical infrastructure sectors, this vulnerability poses a significant risk. WAGO devices are widely deployed in European industrial environments for process control and monitoring. A successful exploitation could lead to denial of service conditions, disrupting operational technology (OT) systems and potentially halting production lines or critical infrastructure operations. The limited out-of-bounds read may also expose sensitive information that could aid further attacks. Given the unauthenticated and remote nature of the exploit, attackers could leverage this vulnerability to cause operational disruptions without needing prior access or credentials. This could have cascading effects on supply chains and critical services, especially in sectors with high reliance on WAGO devices. The lack of available patches increases the urgency for organizations to implement compensating controls to reduce exposure.

Mitigation Recommendations

1. Network Segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices within dedicated OT network segments, restricting access only to trusted management systems and monitoring devices. 2. Access Control Lists (ACLs): Implement strict firewall rules to block unauthorized inbound traffic to the WAGO I/O-Check Service ports from untrusted networks, especially the internet. 3. Intrusion Detection and Prevention: Deploy network-based IDS/IPS solutions configured to detect anomalous packets or command injection attempts targeting WAGO devices. 4. Monitoring and Logging: Enable detailed logging on network gateways and OT management systems to detect unusual traffic patterns or repeated connection attempts to the vulnerable service. 5. Vendor Engagement: Maintain close contact with WAGO for updates on patches or firmware upgrades addressing this vulnerability and plan for timely deployment once available. 6. Incident Response Preparedness: Develop and test response plans for potential DoS incidents affecting OT systems to minimize downtime and operational impact. 7. Device Hardening: Disable or restrict unnecessary services on WAGO devices if possible, reducing the attack surface. 8. Physical Security: Ensure physical access to WAGO devices is controlled to prevent local exploitation or tampering.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2021-06-10T19:19:08.023Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9839c4522896dcbecc7d

Added to database: 5/21/2025, 9:09:13 AM

Last enriched: 6/25/2025, 6:57:06 PM

Last updated: 2/3/2026, 9:49:29 AM

Views: 36

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats