Zurück zur Übersicht

WAGO: Cloud Connectivity Remote Code Execution Vulnerability

VDE-2020-010
Last update
09.03.2020 10:25
Published at
09.03.2020 10:25
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2020-010
CSAF Document

Summary

An attacker needs an authorized login with administrative privileges on the device in order to exploit the herein mentioned vulnerability.
The weakness allows an attacker which has admin privileges on the device to redirect to his own Azure cloud account and install malicious software with the firmware update functionality.

Impact

These vulnerabilities allow an attacker which has admin privileges, an Azure cloud account and also access to the device to redirect the cloud connection. With thus he is able to install any malicious software by manipulating the firmware update file.

An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of affected WAGO products. A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.

Affected Product(s)

Model no. Product name Affected versions
750-81xx/xxx-xxx (PFC100) Firmware >=FW12
750-82xx/xxx-xxx (PFC200) Firmware >=FW12
762-4xxx Firmware >=FW12
762-5xxx Firmware >=FW12
762-6xxx Firmware >=FW12

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Insufficient Verification of Data Authenticity (CWE-345)
Summary

An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.

References

Mitigation

Check the hashes of the Update packet, do not use update files which has a different hash then the original one
Follow the instructions in WAGOs handbook Cyber Security for Controller
Restrict network access to the device.
Do not directly connect the device to the internet
Use an encrypted VPN connection to the device
Disable unused TCP/UDP-ports

Use strong passwords for all user accounts, especially for administrative user accounts on the device.

Revision History

Version Date Summary
1 09.03.2020 10:25 Initial revision.