Back to overview

WAGO: PLC families 750-88x and 750-352 prone to DoS attack, versions < FW10 (Update A)

VDE-2020-042
Last update
05/14/2025 15:00
Published at
10/27/2020 11:28
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2020-042
CSAF Document

Summary

The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for administration, commissioning and updates.
Older firmware versions of the PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.

All newer Firmware releases since FW11, released in December 2017, are not affected.

Impact

An attacker which sends a series of maliciously constructed packets to HTTP(S) ports 80/443 could cause a crashed device, that needs a power on reset to go back to normal operation.

Affected Product(s)

Model no. Product name Affected versions
750-331/xxx-xxx 750-331/xxx-xxx Firmware <=FW10
750-352 750-352 Firmware <=FW10
750-829 750-829 Firmware <=FW10
750-831/xxx-xxx 750-831/xxx-xxx Firmware <=FW10
750-852 750-852 Firmware <=FW10
750-880/xxx-xxx 750-880/xxx-xxx Firmware <=FW10
750-881 750-881 Firmware <=FW10
750-882 750-882 Firmware <=FW10
750-885 750-885 Firmware <=FW10
750-889 750-889 Firmware <=FW10

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Uncontrolled Resource Consumption (CWE-400)
Summary

Older firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.

References

Mitigation

  • Restrict network access to the device.
  • Do not directly connect the device to the internet
  • Disable unused TCP/UDP-ports

Remediation

Update the device to the latest FW version available here:

www.wago.com/us/requestDownload

Revision History

Version Date Summary
1 10/27/2020 11:28 initial revision
2 04/02/2025 12:00 Update: deleted Issuing authority
3 05/14/2025 15:00 Fix: added distribution