Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23852 | Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2023-006/ |
|
Tue, 12 Nov 2024 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Oct 2024 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Wed, 02 Oct 2024 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-1288 |
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-11-12T14:11:36.673Z
Reserved: 2023-03-24T10:12:26.426Z
Link: CVE-2023-1620
Updated: 2024-08-02T05:57:24.833Z
Status : Modified
Published: 2023-06-26T07:15:09.197
Modified: 2024-11-21T07:39:33.570
Link: CVE-2023-1620
No data.
OpenCVE Enrichment
No data.
EUVD