Share: Email | Twitter

ID

VDE-2025-080

Published

2025-09-09 10:00 (CEST)

Last update

2025-09-08 15:00 (CEST)

Vendor(s)

WAGO GmbH & Co. KG

Product(s)

Article No° Product Name Affected Version(s)
Basic Controller 100 0750-800x all
CC100 0751-9x01 all
Controller 0750-0823 all
Controller 0750-0829 all
Controller 0750-0831 (discontinued) all
Controller 0750-0842 all
Controller 0750-0843 all
Controller 0750-0852 (discontinued) all
Controller 0750-0860 (discontinued) all
Controller 0750-0862 all
Controller 0750-0863 (discontinued) all
Controller 0750-0870 (discontinued) all
Controller 0750-0871 (discontinued) all
Controller 0750-0872 (discontinued) all
Controller 0750-0880 (discontinued) all
Controller 0750-0881 (discontinued) all
Controller 0750-0882 (discontinued) all
Controller 0750-0889 all
Controller 0750-0890 all
Controller 0750-0890 all
Controller 0750-0893 all
Edge Controller 0752-8303/8000-0002 all
Fieldbus Coupler 0750-0331 all
Fieldbus Coupler 0750-0331 (discontinued) all
Fieldbus Coupler 0750-0340 (discontinued) all
Fieldbus Coupler 0750-0341 (discontinued) all
Fieldbus Coupler 0750-0342 all
Fieldbus Coupler 0750-0352 (discontinued) all
Fieldbus Coupler 0750-0362 all
Fieldbus Coupler 0750-0363 all
Fieldbus Coupler 0750-0370 (discontinued) all
Fieldbus Coupler 0750-0375 all
Fieldbus Coupler 0750-0377 all
PFC100 G1 0750-810x/xxxx-xxxx all
PFC100 G2 0750-811x-xxxx-xxxx all
PFC200 G1 750-820x-xxx-xxx all
PFC200 G2 750-821x-xxx-xxx all
TP600 0762-420x/8000-000x all
TP600 0762-430x/8000-000x all
TP600 0762-520x/8000-000x all
TP600 0762-530x/8000-000x all
TP600 0762-620x/8000-000x all
TP600 0762-630x/8000-000x all

Summary

A missing authentication vulnerability exists in the iocheckd service "I/O-Check" functionality. A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.


Last Update:

8. September 2025 11:16

Weakness

Missing Authentication for Critical Function  (CWE-306) 

Summary

An exploitable denial-of-service vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A single packet can cause a denial of service and weaken credentials resulting in the default documented credentials being applied to the device. An attacker can send an unauthenticated packet to trigger this vulnerability.


Impact

The reported vulnerability enables a remote attacker to send arbitrary commands without authentication. This could result in changes to settings, application deletion, factory resets, code execution, system crashes or denial of service. By using specially crafted IP packets, the attacker can manipulate settings and disrupt the device's basic functions, potentially gaining control of the device.

Solution

Mitigation

The I/O-Check service protocol is only needed during installation and commissioning, not during normal operations. It is highly recommended to disable the IP-port 6626 after commissioning.

Reported by

CERT@VDE coordinated with Wago