Wago CODESYS V2 Runtime Toolkit Improper Restriction of Operations within the Bounds of a Memory Buffer (CVE-2021-34595)

high Tenable OT Security Plugin ID 503327

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A crafted request with invalid offsets may cause an out-of-bounds read or write access in CODESYS V2 Runtime Toolkit 32 Bit full and PLCWinNT prior to versions V2.4.7.56, resulting in a denial-of-service condition or local memory overwrite.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?5962aea6

Plugin Details

Severity: High

ID: 503327

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 9/9/2025

Updated: 9/9/2025

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:P

CVSS Score Source: CVE-2021-34595

CVSS v3

Risk Factor: High

Base Score: 8.1

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Vulnerability Information

CPE: cpe:/o:wago:750-890_firmware, cpe:/o:wago:750-862_firmware, cpe:/o:wago:750-823_firmware, cpe:/o:wago:750-8203_firmware, cpe:/o:wago:750-8210_firmware, cpe:/o:wago:750-893_firmware, cpe:/o:wago:750-8206_firmware, cpe:/o:wago:750-889_firmware, cpe:/o:wago:750-885_firmware, cpe:/o:wago:750-8217_firmware, cpe:/o:wago:750-8211_firmware, cpe:/o:wago:750-8202_firmware, cpe:/o:wago:750-8204_firmware, cpe:/o:wago:750-8213_firmware, cpe:/o:wago:750-831_firmware, cpe:/o:wago:750-8212_firmware, cpe:/o:wago:750-891_firmware, cpe:/o:wago:750-8214_firmware, cpe:/o:wago:750-8208_firmware, cpe:/o:wago:750-881_firmware, cpe:/o:wago:750-829_firmware, cpe:/o:wago:750-852_firmware, cpe:/o:wago:750-832_firmware, cpe:/o:wago:750-880_firmware, cpe:/o:wago:750-8216_firmware, cpe:/o:wago:750-882_firmware, cpe:/o:wago:750-8207_firmware

Required KB Items: Tenable.ot/Wago

Exploit Ease: No known exploits are available

Patch Publication Date: 10/26/2021

Vulnerability Publication Date: 10/26/2021

Reference Information

CVE: CVE-2021-34595

CWE: 119, 823