Summary
An attacker with administrative privileges which can access sensitive files, can additionally access them in an unintended, undocumented way.
Impact
The user might not notice that files are accessed.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
0751-9?01 | WAGO CC100 0751-9x01 | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0752-8303/8000-0002 | WAGO Edge Controller 0752-8303/8000-0002 | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0750-810?/????-???? | WAGO PFC100 G1 0750-810x/xxxx-xxxx | WAGO Firmware 03.07.14 (FW19)<03.10.11 (FW22 Patch 2), Custom Firmware <03.10.11 (70) |
0750-811?-????-???? | WAGO PFC100 G2 0750-811x-xxxx-xxxx | WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29), Custom Firmware <04.07.01 (70) |
750-820?-????-???? | WAGO PFC200 G1 750-820x-xxx-xxx | Custom Firmware <03.10.11 (70), WAGO Firmware 03.07.14 (FW19)<03.10.11 (FW22 Patch 2) |
750-821?-????-???? | WAGO PFC200 G2 750-821x-xxx-xxx | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-420?/8000-000? | WAGO TP600 0762-420x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-430?/8000-000? | WAGO TP600 0762-430x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-520?/8000-000? | WAGO TP600 0762-520x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-530?/8000-000? | WAGO TP600 0762-530x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-620?/8000-000? | WAGO TP600 0762-620x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
0762-630?/8000-000? | WAGO TP600 0762-630x/8000-000x | Custom Firmware <04.07.01 (70), WAGO Firmware 03.07.14 (FW19)<04.07.01 (FW29) |
Vulnerabilities
Expand / Collapse allAn attacker with administrative privileges can access files to which he has already access to, over the web server in an unintended way which is not documented. The access is logged in a different log file.
Mitigation
As general security measures strongly WAGO recommends:
1. Use general security best practices to protect systems from local and network
attacks.
2. Do not allow direct access to the device from untrusted networks.
3. Update to the latest firmware according to the table in chapter solutions.
Remediation
We recommend all effected users to update to the fixed firmware versions.
Revision History
Version | Date | Summary |
---|---|---|
1 | 10/23/2023 12:00 | Final document. |
2 | 04/28/2025 12:00 | The fixed versions have been updated, because the previously mentioned versions are still vulnerable to this issue. More details have been added to the hardware devices. More affected version numbers were added to the firmwares. |