Skip to main content

CVE-2021-34569: CWE-787 Out-of-bounds Write in WAGO 750-81xx/xxx-xxxFW

Critical
VulnerabilityCVE-2021-34569cvecve-2021-34569cwe-787
Published: Wed Nov 09 2022 (11/09/2022, 15:17:36 UTC)
Source: CVE
Vendor/Project: WAGO
Product: 750-81xx/xxx-xxxFW

Description

In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

AI-Powered Analysis

AILast updated: 06/25/2025, 21:45:43 UTC

Technical Analysis

CVE-2021-34569 is a critical vulnerability classified as CWE-787 (Out-of-bounds Write) affecting WAGO's 750-81xx/xxx-xxxFW series, specifically in the WAGO I/O-Check Service. This service is used for diagnostic purposes in industrial automation environments. The vulnerability arises because the service improperly handles specially crafted packets containing operating system commands. An attacker can exploit this flaw by sending a maliciously constructed packet to the diagnostic tool, causing it to crash and potentially write arbitrary data outside the intended memory bounds. This out-of-bounds write can lead to memory corruption, which may allow an attacker to execute arbitrary code, disrupt the availability of the service, or cause a denial of service (DoS). The vulnerability does not require any authentication or user interaction, and can be exploited remotely over the network (AV:N/AC:L/PR:N/UI:N). The CVSS v3.1 base score is 9.8, indicating a critical severity level, with high impact on confidentiality, integrity, and availability. Although no public exploits have been reported in the wild, the ease of exploitation and the critical nature of the flaw make it a significant threat. The affected firmware version is FW1, and no official patches or updates have been linked in the provided information, suggesting that mitigation may require vendor engagement or network-level protections. Given that WAGO products are widely used in industrial control systems (ICS) and automation, this vulnerability poses a serious risk to operational technology (OT) environments where these devices are deployed.

Potential Impact

For European organizations, especially those operating in industrial sectors such as manufacturing, energy, utilities, and critical infrastructure, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized control or disruption of industrial processes, potentially causing physical damage, production downtime, safety hazards, and financial losses. The compromise of confidentiality could expose sensitive operational data, while integrity violations could manipulate control commands or sensor data, leading to unsafe conditions. Availability impacts could result in denial of service to critical diagnostic tools, hindering maintenance and incident response efforts. Given the increasing convergence of IT and OT networks in Europe, exploitation could also serve as a foothold for lateral movement into broader enterprise networks. The lack of authentication and user interaction requirements means attackers can remotely target vulnerable devices without prior access, increasing the attack surface. The critical severity and network accessibility make timely mitigation essential to prevent potential cascading effects on European industrial operations.

Mitigation Recommendations

1. Immediate network segmentation: Isolate WAGO 750-81xx/xxx-xxxFW devices and the I/O-Check Service from general IT networks and restrict access to trusted management stations only. 2. Implement strict firewall rules and intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious packets targeting the diagnostic service, especially those containing unusual OS command patterns. 3. Conduct thorough asset inventories to identify all affected WAGO devices running FW1 firmware and prioritize them for remediation. 4. Engage with WAGO support or authorized vendors to obtain firmware updates or patches as they become available; if no official patch exists, request guidance or workarounds. 5. Apply compensating controls such as disabling or restricting the diagnostic service if it is not essential for daily operations. 6. Monitor network traffic and device logs for signs of exploitation attempts or anomalous behavior indicative of memory corruption or crashes. 7. Train OT security teams on this specific vulnerability to recognize and respond to related incidents promptly. 8. Consider deploying endpoint detection and response (EDR) solutions tailored for OT environments to detect exploitation attempts in real time.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2021-06-10T19:19:08.023Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec51b

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 9:45:43 PM

Last updated: 8/12/2025, 7:39:49 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats