{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T21:36:20.897","vulnerabilities":[{"cve":{"id":"CVE-2020-12506","sourceIdentifier":"info@cert.vde.com","published":"2020-09-30T16:15:12.777","lastModified":"2024-11-21T04:59:49.660","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions."},{"lang":"es","value":"La vulnerabilidad de autenticación inadecuada en la serie WAGO 750-8XX con versión FW versiones anteriores e iguales a FW03 permite a un atacante cambiar la configuración de los dispositivos mediante el envío de solicitudes específicamente construidas sin autenticación Este problema afecta a: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx en versiones FW03 y anteriores."}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-306"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-362_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"1972A796-844D-47A1-A9EA-37E7A548D8DC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-362:-:*:*:*:*:*:*:*","matchCriteriaId":"6330A839-FAE3-43EB-B1AA-BA6844D9906D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-363_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"13752AD0-7ED9-446E-99F8-153B62BEB062"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-363:-:*:*:*:*:*:*:*","matchCriteriaId":"54E13E9C-226E-4BD6-8F0C-3061092E892A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-823_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"AA3507C4-737A-40F4-B595-45BB1864C5DE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-823:-:*:*:*:*:*:*:*","matchCriteriaId":"CB88572A-CB05-4B52-8BFC-05EFDC819244"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-832_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"2B5FF9F1-E281-4E15-920D-C273A5C87EC2"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-832:-:*:*:*:*:*:*:*","matchCriteriaId":"13D1FA8D-C8BA-4D1C-8372-DECD40177631"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-862_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"D58CF92D-B614-4878-8D1E-182CE7108912"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-862:-:*:*:*:*:*:*:*","matchCriteriaId":"FA04FBFB-9E1C-4618-9FDC-70675506D8D5"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-891_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"D9D36F87-6C54-4CE8-A38B-3FF525B34C47"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-891:-:*:*:*:*:*:*:*","matchCriteriaId":"22BAABD9-A10D-4904-AA02-C37C4490B47A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:wago:750-890_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"fw03","matchCriteriaId":"6A0E9003-3D94-419B-8812-48E5854DF23D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:wago:750-890:-:*:*:*:*:*:*:*","matchCriteriaId":"11751A8B-FCFD-433B-9065-B4FC85168A93"}]}]}],"references":[{"url":"https://cert.vde.com/en-us/advisories/vde-2020-028","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en-us/advisories/vde-2020-028","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}