{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-45139","assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","state":"PUBLISHED","assignerShortName":"CERTVDE","dateReserved":"2022-11-10T09:46:59.080Z","datePublished":"2023-02-27T14:36:32.016Z","dateUpdated":"2025-03-10T17:46:16.888Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Compact Controller CC100 (751-9301)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"Edge Controller (752-8303/8000-002)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW18","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"PFC100 (750-81xx/xxx-xxx)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"PFC200 (750-82xx/xxx-xxx)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"Touch Panel 600 Advanced Line (762-5xxx)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"Touch Panel 600 Marine Line (762-6xxx)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]},{"defaultStatus":"unaffected","product":"Touch Panel 600 Standard Line (762-4xxx)","vendor":"WAGO","versions":[{"lessThan":"FW22","status":"affected","version":"FW16","versionType":"custom"},{"status":"unaffected","version":"FW22 Patch 1"},{"status":"affected","version":"FW23"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Ryan Pickren of Georgia Institute of Technologys Cyber-Physical Security Lab"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."}],"value":"A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality."}],"impacts":[{"capecId":"CAPEC-554","descriptions":[{"lang":"en","value":"CAPEC-554 Functionality Bypass"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-346","description":"CWE-346 Origin Validation Error","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE","dateUpdated":"2023-02-27T14:36:32.016Z"},"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2022-060/"}],"source":{"defect":["CERT@VDE#64160"],"discovery":"UNKNOWN"},"title":"WAGO: Origin validation error through CORS misconfiguration","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T14:09:55.406Z"},"title":"CVE Program Container","references":[{"url":"https://cert.vde.com/en/advisories/VDE-2022-060/","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-10T17:45:54.261351Z","id":"CVE-2022-45139","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-10T17:46:16.888Z"}}]}}