Article No° | Product Name | Affected Version(s) |
---|---|---|
CC100 0751-9x01 | < 04.07.01 (FW29) | |
CC100 0751-9x01 | < 04.07.01 (70) | |
Edge Controller 0752-8303/8000-0002 | < 04.07.01 (FW29) | |
Edge Controller 0752-8303/8000-0002 | < 04.07.01 (70) | |
PFC100 G1 0750-810x/xxxx-xxxx | < 3.10.11 (FW22 Patch 2) | |
PFC100 G1 0750-810x/xxxx-xxxx | < 03.10.11 (70) | |
PFC100 G2 0750-811x-xxxx-xxxx | < 04.07.01 (FW29) | |
PFC100 G2 0750-811x-xxxx-xxxx | < 04.07.01 (70) | |
PFC200 G1 750-820x-xxx-xxx | < 3.10.11 (FW22 Patch 2) | |
PFC200 G1 750-820x-xxx-xxx | < 03.10.11 (70) | |
PFC200 G2 750-821x-xxx-xxx | < 04.07.01 (FW29) | |
PFC200 G2 750-821x-xxx-xxx | < 04.07.01 (70) | |
TP600 0762-420x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-420x/8000-000x | < 04.07.01 (70) | |
TP600 0762-430x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-430x/8000-000x | < 04.07.01 (70) | |
TP600 0762-520x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-520x/8000-000x | < 04.07.01 (70) | |
TP600 0762-530x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-530x/8000-000x | < 04.07.01 (70) | |
TP600 0762-620x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-620x/8000-000x | < 04.07.01 (70) | |
TP600 0762-630x/8000-000x | < 04.07.01 (FW29) | |
TP600 0762-630x/8000-000x | < 04.07.01 (70) |
Vulnerabilities have been discovered in the WAGO Device Manager that allow any origin to access the server and set header values, as well as an endpoint that permits read access to the file system. The WAGO Device Manager is a software for configuring and parameterizing single WAGO products, which is included in the firmware. These vulnerabilities could be exploited by attackers to send requests and read server responses through crafted web applications or to access the file system.
An unauthenticated remote attacker can take advantage of the current overly permissive CORS policy to gain access and read the responses, potentially exposing sensitive data or enabling further attacks.
A web application for configuring the controller is accessible at a specific path. It contains an endpoint that allows an unauthenticated remote attacker to read files from the system’s file structure.
The vulnerabilities in the WAGO Device Manager allow unauthorized access to server resources, data leakage, remote exploitation, and compromise of device integrity. Attackers can exploit these vulnerabilities to access sensitive information, perform malicious actions remotely, and identify additional weaknesses, potentially leading to data breaches and further security issues.
Remediation
Update to Firmware version 04.07.01 (FW29) or 03.10.11 (FW22 Patch 2). For the latest Custom Firmware please contact the WAGO support.
CERT@VDE coordinated with WAGO GmbH & Co. KG