Summary
The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for commissioning and update. The controller is an embedded device which has limited resources. The vulnerability described here takes advantage of this fact.With special crafted requests it is possible to have a denial of service of the WBM.
Impact
The default configuration of the web server limits the number of concurrent processes, which can be abused to cause a DoS of the WBM.This vulnerability allows an attacker, who has access to the device, to cause a denial of service of the WBM, by sending special crafted requests.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
750-81xx/xxx-xxx (PFC100) | Firmware vers:all/* | |
750-82xx/xxx-xxx (PFC200) | Firmware vers:all/* | |
762-4xxx | Firmware vers:all/* | |
762-5xxx | Firmware vers:all/* | |
762-6xxx | Firmware vers:all/* |
Vulnerabilities
Expand / Collapse allThe WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12) and version 03.02.02(14).
Mitigation
- Follow the instructions in WAGOs handbook Cyber Security for Controller
- Restrict network access to the device.
- Do not directly connect the device to the internet
Due to the limited resources on the embedded device, it is necessary to protect it from unauthorized access such as denial of service attacks.
Revision History
Version | Date | Summary |
---|---|---|
1 | 03/09/2020 10:10 | Initial revision. |