Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-004 |
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wago
Wago 0852-1322 Wago 0852-1328 |
|
| Vendors & Products |
Wago
Wago 0852-1322 Wago 0852-1328 |
Mon, 09 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication bypass. | |
| Title | Hardcoded Key Allows Credential Disclosure | |
| Weaknesses | CWE-321 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-02-09T15:31:17.549Z
Reserved: 2026-01-13T08:33:25.684Z
Link: CVE-2026-22906
Updated: 2026-02-09T15:30:59.187Z
Status : Deferred
Published: 2026-02-09T08:16:11.723
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-22906
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:45:28Z