Known Vulnerabilities for Pfc100 by Wago

Listed below are 7 of the newest known vulnerabilities associated with "Pfc100" by "Wago".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2020-8597 eap.c in pppd in ppp 2.4.2 through 2.4.8 has an rhostname buffer overflow in the eap_request and eap_response functions. 9.8 - CRITICAL 2020-02-03 2023-11-07
CVE-2019-18202 Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A rem... 5.3 - MEDIUM 2019-10-19 2023-03-13
CVE-2019-10953 ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have... 7.5 - HIGH 2019-04-17 2022-01-31
CVE-2019-5149 The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a l... 7.5 - HIGH 2020-03-11 2020-03-13
CVE-2019-5135 An exploitable timing discrepancy vulnerability exists in the authentication functionality of the Web-Based Management (WBM) ... 5.3 - MEDIUM 2020-03-11 2021-07-21
CVE-2019-5134 An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication funct... 7.5 - HIGH 2020-03-11 2020-08-24
CVE-2019-5082 An exploitable heap buffer overflow vulnerability exists in the iocheckd service I/O-Check functionality of WAGO PFC200 Firmw... 9.8 - CRITICAL 2020-01-08 2020-01-22
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report