Zurück zur Übersicht

WAGO: Multiple vulnerabilities in web-based management of multiple products

VDE-2022-060
Last update
27.02.2023 12:00
Published at
27.02.2023 12:00
Vendor(s)
WAGO GmbH & Co. KG
External ID
VDE-2022-060
CSAF Document

Summary

The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for administration, commissioning and updates.
The configuration backend can in some cases be used without authentication and to write data with root privileges. Additionally, the web-based management suffers a CORS misconfiguration and allows reflected XSS (Cross-Site Scripting) attacks.

Impact

The web-based management of affected products is vulnerable to Reflective Cross-Site Scripting. This can be used to install malicious code and to gain access to confidential information on a System that connects to the WBM after it has been compromised.
Additionally, the web-based management of affected products is vulnerable to stealing and setting device parameters and remote code execution by an unauthenticated attacker.

Affected Product(s)

Model no. Product name Affected versions
751-9301 Compact Controller 100 Firmware FW23, Firmware FW16<=FW22
752-8303/8000-002 Edge Controller Firmware FW18<=FW22, Firmware FW23
750-81xx/xxx-xxx PFC100 Firmware FW16<=FW22, Firmware FW23
750-82xx/xxx-xxx PFC200 Firmware FW23, Firmware FW16<=FW22
762-5xxx Touch Panel 600 Advanced Line Firmware FW23, Firmware FW16<=FW22
762-6xxx Touch Panel 600 Marine Line Firmware FW23, Firmware FW16<=FW22
762-4xxx Touch Panel 600 Standard Line Firmware FW16<=FW22, Firmware FW23

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.

References

Published
22.09.2025 14:57
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.

References

Published
22.09.2025 14:57
Weakness
Origin Validation Error (CWE-346)
Summary

A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.

References

Mitigation

  • If not needed, you can deactivate the web-based management to prevent attacks (command line)
  • Restrict network access to the device.
  • Do not directly connect the device to the internet

Remediation

We recommend all users of affected products to install FW22 Patch 1 or FW24 or higher.

Revision History

Version Date Summary
1 27.02.2023 12:00 Initial revision.