Back to overview

WAGO: e!Cockpit Two Update Package Vulnerabilities

VDE-2020-009
Last update
05/22/2025 15:03
Published at
03/09/2020 10:18
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2020-009
CSAF Document

Summary

The firmware update package (WUP) is not signed entirely. The used password offers no additional security, it is just meant to protect from unintentional modifications of the WUP file. Thus only the integrity of the signed firmware part (rauc file) is protected against intended manipulation. An attacker could manipulate the WUP file in a way that additional files with potentially malicious content are added to the WUP file.
In case an authorized user that issues a firmware update could be tricked into installing this manipulated WUP file onto the device, the potentially malicious files would also be copied and installed on to the device and executed with elevated privileges.

Impact

The vulnerabilities allow an attacker who is able to exploit the described vulnerabilities and to trick an authorized user into installing the manipulated WUP file on the controller, to manipulate, to add or to remove any files they choose to from the corresponding device. Potentially malicious files may be executed.

Affected Product(s)

Model no. Product name Affected versions
750-81xx/xxx-xxx WAGO 750-81xx/xxx-xxx Firmware >=FW12
750-82xx/xxx-xxx WAGO 750-82xx/xxx-xxx Firmware >=FW12
762-4xxx WAGO 762-4xxx Firmware >=FW12
762-5xxx WAGO 762-5xxx Firmware >=FW12
762-6xxx WAGO 762-6xxx Firmware >=FW12

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers as a part of executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update package file using any zip utility. The user must initiate a firmware update through e!COCKPIT and choose the malicious wup file using the file browser to trigger the vulnerability.

References

Published
09/22/2025 14:57
Weakness
Use of Hard-coded Credentials (CWE-798)
Summary

An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.

References

Mitigation

Execute FW-Update only as user 'admin'.

Remediation

Validate the integrity of the WUP update package by verifying the hash of the file before starting FW update.

Revision History

Version Date Summary
1 03/09/2020 10:18 initial revision
2 05/22/2025 15:03 Fix: version space, quotation mark