Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

wago

About This Vendor

wago is a technology vendor producing software and infrastructure products. As a software provider, wago's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of wago's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 114 known vulnerabilities from wago. This includes 39 critical-severity issues and 50 high-severity issues that represent significant risk. These vulnerabilities affect 403 distinct products across wago's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2012 through 2025, indicating decades of continuous security attention and research. Organizations deploying wago products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2012-3013 2012-09-07 2025-04-11 - 10.0 Likely
CVE-2012-4879 2012-09-07 2025-04-11 - 10.0 Likely
CVE-2016-9362 2017-02-13 2025-04-20 9.1 6.4 Likely
CVE-2015-6472 2017-08-22 2025-04-20 9.8 5.0 Likely
CVE-2015-6473 2017-08-22 2025-04-20 9.8 10.0 Likely
CVE-2018-5459 2018-02-13 2024-11-21 9.8 7.5 Likely
CVE-2018-8836 2018-04-03 2024-11-21 5.3 5.0 Likely
CVE-2018-12979 2018-07-12 2024-11-21 6.5 5.5 Likely
CVE-2018-12980 2018-07-12 2024-11-21 8.8 6.5 Likely
CVE-2018-12981 2018-07-12 2024-11-21 5.4 3.5 Unknown
CVE-2018-16210 2018-10-12 2025-06-13 6.1 4.3 Likely
CVE-2019-10953 2019-04-17 2024-11-21 7.5 5.0 Likely
CVE-2019-10712 2019-05-07 2024-11-21 9.8 7.5 Likely
CVE-2019-12549 2019-06-17 2024-11-21 9.8 10.0 Likely
CVE-2019-12550 2019-06-17 2024-11-21 9.8 10.0 Likely
CVE-2019-18202 2019-10-19 2024-11-21 5.3 5.0 Likely
CVE-2019-5074 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-5077 2019-12-18 2024-11-21 9.1 8.5 Likely
CVE-2019-5081 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-5073 2019-12-18 2024-11-21 5.3 5.0 Likely
CVE-2019-5075 2019-12-18 2024-11-21 9.8 10.0 Likely
CVE-2019-5078 2019-12-18 2024-11-21 9.1 9.4 Likely
CVE-2019-5079 2019-12-18 2024-11-21 9.8 7.5 Likely
CVE-2019-5080 2019-12-18 2024-11-21 9.1 6.4 Likely
CVE-2019-5082 2020-01-08 2024-11-21 9.8 7.5 Likely
CVE-2020-8597 2020-02-03 2025-12-03 9.8 7.5 Likely
CVE-2019-5106 2020-03-11 2024-11-21 5.5 2.1 Unknown
CVE-2019-5107 2020-03-11 2024-11-21 7.5 5.0 Likely
CVE-2019-5134 2020-03-11 2024-11-21 7.5 5.0 Likely
CVE-2019-5135 2020-03-11 2024-11-21 5.3 5.0 Likely
CVE-2019-5149 2020-03-11 2024-11-21 7.5 5.0 Likely
CVE-2019-5155 2020-03-11 2024-11-21 7.2 9.0 Likely
CVE-2019-5156 2020-03-11 2024-11-21 7.2 6.5 Likely
CVE-2019-5157 2020-03-11 2024-11-21 7.2 6.5 Likely
CVE-2019-5158 2020-03-11 2024-11-21 7.8 4.3 Likely
CVE-2019-5159 2020-03-11 2024-11-21 7.8 6.8 Likely
CVE-2019-5160 2020-03-11 2024-11-21 9.1 6.5 Likely
CVE-2019-5161 2020-03-11 2024-11-21 9.1 9.0 Likely
CVE-2019-5166 2020-03-11 2024-11-21 7.8 4.6 Unknown
CVE-2019-5167 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5168 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5172 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5173 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5174 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5175 2020-03-11 2024-11-21 7.8 7.2 Unknown
CVE-2019-5182 2020-03-11 2024-11-21 5.5 2.1 Unknown
CVE-2019-5169 2020-03-12 2024-11-21 7.8 7.2 Unknown
CVE-2019-5170 2020-03-12 2024-11-21 7.8 7.2 Unknown
CVE-2019-5171 2020-03-12 2024-11-21 7.8 7.2 Unknown
CVE-2019-5176 2020-03-12 2024-11-21 5.5 2.1 Unknown
CVE-2019-5177 2020-03-12 2024-11-21 5.5 2.1 Unknown
CVE-2019-5178 2020-03-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-5179 2020-03-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-5180 2020-03-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-5181 2020-03-12 2024-11-21 7.8 4.6 Unknown
CVE-2019-5184 2020-03-23 2024-11-21 7.8 4.6 Unknown
CVE-2019-5185 2020-03-23 2024-11-21 7.0 4.4 Unknown
CVE-2019-5186 2020-03-23 2024-11-21 7.0 4.4 Unknown
CVE-2020-6090 2020-06-11 2024-11-21 7.2 9.0 Likely
CVE-2020-12505 2020-09-30 2024-11-21 8.2 6.4 Likely
CVE-2020-12506 2020-09-30 2024-11-21 9.1 6.4 Likely
CVE-2020-12516 2020-12-10 2024-11-21 7.5 5.0 Likely
CVE-2020-12522 2020-12-17 2024-11-21 10.0 10.0 Likely
CVE-2020-12525 2021-01-22 2024-11-21 7.3 6.8 Likely
CVE-2021-20993 2021-05-13 2024-11-21 5.3 5.0 Likely
CVE-2021-20994 2021-05-13 2024-11-21 8.8 4.3 Likely
CVE-2021-20995 2021-05-13 2024-11-21 5.3 5.0 Likely
CVE-2021-20996 2021-05-13 2024-11-21 5.3 5.0 Likely
CVE-2021-20997 2021-05-13 2024-11-21 7.5 5.0 Likely
CVE-2021-20998 2021-05-13 2024-11-21 10.0 7.5 Likely
CVE-2021-21000 2021-05-24 2025-08-15 5.3 5.0 Likely
CVE-2021-21001 2021-05-24 2025-08-15 9.1 4.0 Likely
CVE-2021-30187 2021-05-25 2025-08-15 5.3 4.6 Unknown
CVE-2021-30186 2021-05-25 2025-08-15 7.5 5.0 Likely
CVE-2021-30188 2021-05-25 2025-08-15 9.8 7.5 Likely
CVE-2021-30189 2021-05-25 2025-08-15 9.8 7.5 Likely
CVE-2021-30190 2021-05-25 2025-08-15 9.8 7.5 Likely
CVE-2021-30191 2021-05-25 2025-08-15 7.5 5.0 Likely
CVE-2021-30192 2021-05-25 2025-08-15 9.8 7.5 Likely
CVE-2021-30193 2021-05-25 2025-08-15 9.8 7.5 Likely
CVE-2021-30194 2021-05-25 2025-08-15 9.1 6.4 Likely
CVE-2021-30195 2021-05-25 2025-08-15 7.5 5.0 Likely
CVE-2021-34578 2021-08-31 2024-11-21 9.8 6.8 Likely
CVE-2021-34581 2021-08-31 2024-11-21 7.5 7.8 Likely
CVE-2021-34583 2021-10-26 2025-08-15 7.5 5.0 Likely
CVE-2021-34584 2021-10-26 2025-08-15 9.1 6.4 Likely
CVE-2021-34585 2021-10-26 2025-08-15 7.5 5.0 Likely
CVE-2021-34586 2021-10-26 2025-08-15 7.5 5.0 Likely
CVE-2021-34593 2021-10-26 2025-08-15 7.5 5.0 Likely
CVE-2021-34595 2021-10-26 2025-08-15 8.1 5.5 Likely
CVE-2021-34596 2021-10-26 2025-08-15 6.5 4.0 Likely
CVE-2022-22511 2022-03-09 2024-11-21 5.4 3.5 Unknown
CVE-2022-3281 2022-10-17 2024-11-21 7.5 - -
CVE-2021-34566 2022-11-09 2024-11-21 9.1 - -
CVE-2021-34567 2022-11-09 2024-11-21 8.2 - -
CVE-2021-34568 2022-11-09 2024-11-21 7.5 - -
CVE-2021-34569 2022-11-09 2024-11-21 9.8 - -
CVE-2020-12069 2022-12-26 2025-05-05 7.8 - -
CVE-2022-3738 2023-01-19 2024-11-21 5.9 - -
CVE-2022-3843 2023-02-16 2024-11-21 9.1 - -
CVE-2022-45137 2023-02-27 2024-11-21 6.1 - -
CVE-2022-45138 2023-02-27 2024-11-21 9.8 - -
CVE-2022-45139 2023-02-27 2024-11-21 5.3 - -
CVE-2022-45140 2023-02-27 2024-11-21 9.8 - -
CVE-2023-1698 2023-05-15 2024-11-21 9.8 - -
CVE-2023-1150 2023-06-26 2024-11-21 7.5 - -
CVE-2023-1619 2023-06-26 2024-11-21 4.9 - -
CVE-2023-1620 2023-06-26 2024-11-21 4.9 - -
CVE-2023-4089 2023-10-17 2024-11-21 2.7 - -
CVE-2023-3379 2023-11-20 2024-11-21 5.3 - -
CVE-2023-4149 2023-11-21 2024-11-21 9.8 - -
CVE-2023-5188 2023-12-05 2024-11-21 7.5 - -
CVE-2025-41730 2025-12-10 2025-12-19 9.8 - -
CVE-2025-41732 2025-12-10 2025-12-19 9.8 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for wago by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with wago's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.