Article No° | Product Name | Affected Version(s) |
---|---|---|
Compact Controller CC 100 (751-9301) | FW 20 | |
Compact Controller CC 100 (751-9301) | FW 23 | |
PFC 200 (750-82xx/xxx-xxx) | FW 17 | |
PFC 200 (750-82xx/xxx-xxx) | FW 22 |
Several vulnerabilities have been identified in the web-based management of WAGO devices utilized in Endress+Hauser IoT solutions. WAGO has provided fixes for these vulnerabilities, which have been integrated into the solutions by Endress+Hauser. Additionally, a guideline on secure operation of these solutions has been made available.
The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
With Cross-Site-Scripting it would be possible to attack a user’s Web Browser, thereby potentially leaking data, including personal and device data, to other 3rd parties. In case of leaked backup data, then credentials used to authenticate with the remote services are also compromised.
If the attacker has physical access to the component, then
Mitigation
If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of the Web Based Management tool from the internet. This can be achieved by using a network element, such as a router, which hides and secures the components from the internet.
Remediation
Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the vulnerability. Endress+Hauser strongly recommends customers to update to at least firmware FW 25. For support, please contact your local service center.
General Recommendations
Endress+Hauser recommends using the solutions only in a secure environment and to allow access to their components only to authorized persons.
In this context, Endress+Hauser characterizes a secure environment as follows:
CERT@VDE coordinated with Endress+Hauser.
CVE-2023-1698 was reported by Quentin Kaiser from ONEKEY. The other vulnerabilities were reported to WAGO by Ryan Pickren from Georgia Institute of Technology's Cyber-Physical Security Lab.