These vulnerabilities were reported by Kelly Leuschner of Cisco Talos to WAGO. Coordination done by CERT@VDE.
Article No° | Product Name | Affected Version(s) |
---|---|---|
750-81xx/xxx-xxx (PFC100) | >= FW12 | |
750-82xx/xxx-xxx (PFC200) | >= FW12 | |
762-4xxx | >= FW12 | |
762-5xxx | >= FW12 | |
762-6xxx | >= FW12 |
An attacker needs an authorized login with administrative privileges on the device in order to exploit the herein mentioned vulnerability.
The weakness allows an attacker which has admin privileges on the device to redirect to his own Azure cloud account and install malicious software with the firmware update functionality.
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.
These vulnerabilities allow an attacker which has admin privileges, an Azure cloud account and also access to the device to redirect the cloud connection. With thus he is able to install any malicious software by manipulating the firmware update file.
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of affected WAGO products. A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.
Mitigation
Check the hashes of the Update packet, do not use update files which has a different hash then the original one
Follow the instructions in WAGOs handbook Cyber Security for Controller
Restrict network access to the device.
Do not directly connect the device to the internet
Use an encrypted VPN connection to the device
Disable unused TCP/UDP-ports
Solution
Use strong passwords for all user accounts, especially for administrative user accounts on the device.
These vulnerabilities were reported by Kelly Leuschner of Cisco Talos to WAGO. Coordination done by CERT@VDE.