Total vulnerabilities in the database
The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.
Software | From | Fixed in |
---|---|---|
wago / pfc100_firmware | 16 | 22.x |
wago / pfc200_firmware | 16 | 22.x |
wago / touch_panel_600_advanced_firmware | 16 | 22.x |
wago / touch_panel_600_standard_firmware | 16 | 22.x |
wago / touch_panel_600_marine_firmware | 16 | 22.x |
wago / cc100_firmware | 16 | 22.x |
wago / edge_controller_firmware | 16 | 22.x |