Back to overview

WAGO: Unauthenticated Configuration Export in web-based management in multiple devices

VDE-2022-054
Last update
01/12/2023 08:52
Published at
01/12/2023 08:52
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2022-054
CSAF Document

Summary

A vulnerability in the web-based management (WBM) of WAGOs programmable logic controller (PLC) could allow an unauthenticated remote attacker to retrieve sensitive information.

Impact

The vulnerability allows a remote, unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.

Affected Product(s)

Model no. Product name Affected versions
750-81xx/xxx-xxx Series WAGO PFC100 Firmware FW16 <= FW22
750-82xx/xxx-xxx Series WAGO PFC200 Firmware FW16 <= FW22
762-5xxx Series WAGO Touch Panel 600 Advanced Line Firmware FW16 <= FW22
762-6xxx Series WAGO Touch Panel 600 Marine Line Firmware FW16 <= FW22
762-4xxx Series WAGO Touch Panel 600 Standard Line Firmware FW16 <= FW22
751-9301 WAGO Compact Controller CC100 Firmware FW16 <= FW22
752-8303/8000-002 WAGO Edge Controller Firmware FW16 <= FW22

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

The vulnerability allows a remote unauthenticated attacker to download a backup file, if one exists. That backup file might contain sensitive information like credentials and cryptographic material. A valid user has to create a backup after the last reboot for this attack to be successfull.

References

Remediation

Install FW22 Patch 1

Revision History

Version Date Summary
1 01/12/2023 08:52 Initial revision.