Article No° | Product Name | Affected Version(s) |
---|---|---|
750-81xx/xxx-xxx | <= FW18 Patch 2 | |
750-82xx/xxx-xxx | <= FW18 Patch 2 | |
752-8303/8000-0002 | <= FW18 Patch 2 | |
762-4xxx | <= FW18 Patch 2 | |
762-5xxx | <= FW18 Patch 2 | |
762-6xxx | <= FW18 Patch 2 |
By exploiting the described vulnerabilities, the attacker potentially is able to manipulate or disrupt the device.
Mitigation
Solution
The I/O-Check service protocol is only needed during installation and commissioning, not during normal operations. It is highly recommended to disable the I/O-Check service after commissioning. This is the easiest and securest way to protect your device from the listed vulnerabilities and possible upcoming zero-day exploits.
Regardless to the action described above, the vulnerability has been fixed in FW18 Patch 3, released in June 2021.
We recommend all affected users to update to the latest firmware version.
These vulnerabilities were reported to WAGO by Uri Katz of Claroty. We thank CERT@VDE for the management of this coordinated disclosure.