Back to overview

WAGO: FTP-Server - Denial-of-Service

VDE-2022-047
Last update
10/12/2022 10:00
Published at
10/12/2022 10:00
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2022-047
CSAF Document

Summary

The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.See also: Siemens Advisory published October 11th, 2022 - SSA-313313

Impact

Abusing this vulnerability an attacker can crash an affected product, which fully prevents the product to work as intended. After a complete restart the component works as expected.

Affected Product(s)

Model no. Product name Affected versions
750-330 750-330 Firmware <=FW13
750-332 750-332 Firmware <=FW10
750-352/xxx-xxx 750-352/xxx-xxx Firmware <=FW14
750-362/xxx-xxx 750-362/xxx-xxx Firmware <=FW10
750-363/xxx-xxx 750-363/xxx-xxx Firmware <=FW10
750-364/xxx-xxx 750-364/xxx-xxx Firmware <=FW10
750-365/xxx-xxx 750-365/xxx-xxx Firmware <=FW10
750-823 750-823 Firmware <=FW10
750-829 750-829 Firmware <=FW13
750-831/xxx-xxx 750-831/xxx-xxx Firmware <=FW13
750-832/xxx-xxx 750-832/xxx-xxx Firmware <=FW10
750-852 750-852 Firmware <=FW16
750-862 750-862 Firmware <=FW10
750-880/xxx-xxx 750-880/xxx-xxx Firmware <=FW16
750-881 750-881 Firmware <=FW16
750-882 750-882 Firmware <=FW16
750-885/xxx-xxx 750-885/xxx-xxx Firmware <=FW16
750-889 750-889 Firmware <=FW16
750-890/xxx-xxx 750-890/xxx-xxx Firmware <=FW10
750-891 750-891 Firmware <=FW10
750-893 750-893 Firmware <=FW10

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Uncontrolled Resource Consumption (CWE-400)
Summary

A vulnerability has been identified in Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions), Nucleus Source Code (Versions including affected FTP server). The FTP server does not properly release memory resources that were reserved for incomplete connection attempts by FTP clients. This could allow a remote attacker to generate a denial of service condition on devices that incorporate a vulnerable version of the FTP server.

References

Mitigation

If you enabled the FTP-Server, but you do not need FTP data transfer, you can deactivate the FTP Server over the product settings in the web-based management.

As general security measures strongly WAGO recommends:

  1. Use general security best practices to protect systems from local and network attacks.

  2. Do not allow direct access to the device from untrusted networks.

  3. Update to the latest firmware according to the table in chapter solutions.

  4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.
    The BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf external link).

Remediation

Wago recommends all effected users to update to the firmware version listed below:

Series WAGO 750-3x / -8x

Article Number Fixed Version
750-330 Beta FW17 Q1/2023
750-332 FW11 after BACnet certification
750-352/xxx-xxx FW17 Q1/2023
750-362/xxx-xxx FW11 Q1/2023
750-363/xxx-xxx FW11 Q1/2023
750-364/xxx-xxx FW11 Q1/2023
750-365/xxx-xxx FW11 Q1/2023
750-823 FW11 Q1/2023
750-829 Beta FW17 Q1/2023
750-831/xxx-xxx Beta FW17 Q1/2023
750-832/xxx-xxx FW11 after BACnet certification
750-852 FW17 Q1/2023
750-862 FW11 Q1/2023
750-880/xxx-xxx FW17 Q1/2023
750-881 FW17 Q1/2023
750-882 FW17 Q1/2023
750-885/xxx-xxx FW17 Q1/2023
750-889 FW17 Q1/2023
750-890/xxx-xxx FW11 Q1/2023
750-891 FW11 Q1/2023
750-893 FW11 Q1/2023

Revision History

Version Date Summary
1 10/12/2022 10:00 Initial revision.