Zurück zur Übersicht

Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities

VDE-2024-054
Last update
22.05.2025 15:03
Published at
21.10.2024 10:00
Vendor(s)
Endress+Hauser AG
External ID
VDE-2024-054
CSAF Document

Summary

Several vulnerabilities have been identified in the web-based management of WAGO devices utilized in
Endress+Hauser IoT solutions. WAGO has provided fixes for these vulnerabilities, which have been
integrated into the solutions by Endress+Hauser. Additionally, a guideline on secure operation of these
solutions has been made available.

Impact

With Cross-Site-Scripting it would be possible to attack a user's Web Browser, thereby potentially leaking
data, including personal and device data, to other 3rd parties. In case of leaked backup data, then credentials
used to authenticate with the remote services are also compromised.\
If the attacker has physical access to the component, then
* The devices connected to the components may no longer be available in Netilion.
* The data received by Netilion from the connected devices could be manipulated data.
* The components could be a vector in other cyber-attacks.
* Data from the components and connected devices could be leaked to 3rd parties.

Affected Product(s)

Model no. Product name Affected versions
Endress+Hauser Compact Controller CC 100 (751-9301) Endress+Hauser FW20, Endress+Hauser FW23
Endress+Hauser PFC 200 (750-82xx/xxx-xxx) Endress+Hauser FW22, Endress+Hauser FW17

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.

References

Published
22.09.2025 14:57
Weakness
Missing Authentication for Critical Function (CWE-306)
Summary

The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (CWE-78)
Summary

In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.

References

Published
22.09.2025 14:57
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.

References

Published
22.09.2025 14:57
Weakness
Origin Validation Error (CWE-346)
Summary

A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.

References

Mitigation

If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of
the Web Based Management tool from the internet. This can be achieved by using a network element, such
as a router, which hides and secures the components from the internet.

Remediation

Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the
vulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For
support, please contact your local service center.

Revision History

Version Date Summary
1 21.10.2024 10:00 Initial revision.
2 06.11.2024 12:27 Fix: correct certvde domain, added self-reference
3 22.05.2025 15:03 Fix: version space, quotation mark