Article No° | Product Name | Affected Version(s) |
---|---|---|
751-9301 | Compact Controller CC100 | FW20 <= FW22 |
751-9301 | Compact Controller CC100 | = FW23 |
752-8303/8000-002 | Edge Controller | = FW22 |
750-81xx/xxx-xxx | PFC100 | FW20 <= FW22 |
750-82xx/xxx-xxx | PFC200 | FW20 <= FW22 |
750-821x/xxx-xxx | PFC200 | = FW23 |
762-5xxx | Touch Panel 600 Advanced Line | = FW22 |
762-6xxx | Touch Panel 600 Marine Line | = FW22 |
762-4xxx | Touch Panel 600 Standard Line | = FW22 |
The “legal information” plugin of web-based-management contained a vulnerability which allowed execution of arbitrary commands with privileges of www user.
UPDATE A 15.06.2023 :
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.
Exploiting the vulnerability provides arbitrary command execution with privileges of the 'www' user. Via this flaw an attacker can change device configuration, create users or even take over the system.
Mitigation
As general security measures strongly WAGO recommends:
The BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf).
Remediation
Wago recommends all effected users to update to the firmware version listed below:
Article No° | Product Name | Fixed Version |
751-9301 | Compact Controller CC100 | FW24 |
752-8303/8000-002 | Edge Controller | FW22 SP1 or higher patch level |
752-8303/8000-002 | Edge Controller | FW24 |
750-81xx/xxx-xxx | PFC100 | FW22 SP1 or higher patch level |
750-82xx/xxx-xxx | PFC200 | FW22 SP1 or higher patch level |
750-821x/xxx-xxx | PFC200 | FW24 |
762-5xxx | Touch Panel 600 Advanced Line | FW22 SP1 or higher patch level |
762-5xxx | Touch Panel 600 Advanced Line | FW24 |
762-6xxx | Touch Panel 600 Marine Line | FW22 SP1 or higher patch level |
762-6xxx | Touch Panel 600 Marine Line | FW24 |
762-4xxx | Touch Panel 600 Standard Line | FW22 SP1 or higher patch level |
762-4xxx | Touch Panel 600 Standard Line | FW24 |
The vulnerability was reported by Quentin Kaiser from ONEKEY.
Coordination done by CERT@VDE.