VDE-2020-007
Vulnerability from csaf_wagogmbhcokg - Published: 2020-03-09 09:10 - Updated: 2020-03-09 09:10Summary
WAGO: Web-Based Management Denial of Service
Notes
Summary: The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for commissioning and update. The controller is an embedded device which has limited resources. The vulnerability described here takes advantage of this fact.With special crafted requests it is possible to have a denial of service of the WBM.
Impact: The default configuration of the web server limits the number of concurrent processes, which can be abused to cause a DoS of the WBM.This vulnerability allows an attacker, who has access to the device, to cause a denial of service of the WBM, by sending special crafted requests.
Mitigation: - Follow the instructions in WAGOs handbook Cyber Security for Controller
- Restrict network access to the device.
- Do not directly connect the device to the internet
Due to the limited resources on the embedded device, it is necessary to protect it from unauthorized access such as denial of service attacks.
The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12) and version 03.02.02(14).
7.5 (High)
Mitigation
- Follow the instructions in WAGOs handbook Cyber Security for Controller
- Restrict network access to the device.
- Do not directly connect the device to the internet
Due to the limited resources on the embedded device, it is necessary to protect it from unauthorized access such as denial of service attacks.
References
| URL | Category | |
|---|---|---|
Acknowledgments
CERT@VDE
certvde.com
Cisco Talos
Daniel Patrick DeSantis
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Daniel Patrick DeSantis"
],
"organization": "Cisco Talos",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for commissioning and update. The controller is an embedded device which has limited resources. The vulnerability described here takes advantage of this fact.With special crafted requests it is possible to have a denial of service of the WBM.",
"title": "Summary"
},
{
"category": "description",
"text": "The default configuration of the web server limits the number of concurrent processes, which can be abused to cause a DoS of the WBM.This vulnerability allows an attacker, who has access to the device, to cause a denial of service of the WBM, by sending special crafted requests.",
"title": "Impact"
},
{
"category": "description",
"text": "- Follow the instructions in WAGOs handbook Cyber Security for Controller\n- Restrict network access to the device.\n- Do not directly connect the device to the internet\n\nDue to the limited resources on the embedded device, it is necessary to protect it from unauthorized access such as denial of service attacks.",
"title": "Mitigation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "self",
"summary": "VDE-2020-007: WAGO: Web-Based Management Denial of Service - HTML",
"url": "https://certvde.com/en/advisories/VDE-2020-007/"
},
{
"category": "self",
"summary": "VDE-2020-007: WAGO: Web-Based Management Denial of Service - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-007.json"
},
{
"category": "external",
"summary": "Vendor PSIRT",
"url": "https://www.wago.com/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for WAGO GmbH \u0026 Co. KG",
"url": "https://certvde.com/en/advisories/vendor/wago/"
}
],
"title": "WAGO: Web-Based Management Denial of Service",
"tracking": {
"aliases": [
"VDE-2020-007"
],
"current_release_date": "2020-03-09T09:10:00.000Z",
"generator": {
"date": "2025-04-23T08:44:58.268Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.23"
}
},
"id": "VDE-2020-007",
"initial_release_date": "2020-03-09T09:10:00.000Z",
"revision_history": [
{
"date": "2020-03-09T09:10:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "750-81xx/xxx-xxx (PFC100)",
"product": {
"name": "750-81xx/xxx-xxx (PFC100)",
"product_id": "CSAFPID-11001"
}
},
{
"category": "product_name",
"name": "750-82xx/xxx-xxx (PFC200)",
"product": {
"name": "750-82xx/xxx-xxx (PFC200)",
"product_id": "CSAFPID-11002"
}
},
{
"category": "product_name",
"name": "762-4xxx",
"product": {
"name": "762-4xxx",
"product_id": "CSAFPID-11003"
}
},
{
"category": "product_name",
"name": "762-5xxx",
"product": {
"name": "762-5xxx",
"product_id": "CSAFPID-11004"
}
},
{
"category": "product_name",
"name": "762-6xxx",
"product": {
"name": "762-6xxx",
"product_id": "CSAFPID-11005"
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware vers:all/*",
"product_id": "CSAFPID-21001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "WAGO"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
],
"summary": "Affected products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on 750-81xx/xxx-xxx (PFC100)",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on 750-82xx/xxx-xxx (PFC200)",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on 762-4xxx",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on 762-5xxx",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware vers:all/* installed on 762-6xxx",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5149",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "description",
"text": "The WBM web application on firmwares prior to 03.02.02 and 03.01.07 on the WAGO PFC100 and PFC2000, respectively, runs on a lighttpd web server and makes use of the FastCGI module, which is intended to provide high performance for all Internet applications without the penalties of Web server APIs. However, the default configuration of this module appears to limit the number of concurrent php-cgi processes to two, which can be abused to cause a denial of service of the entire web server. This affects WAGO PFC200 Firmware version 03.00.39(12) and version 03.01.07(13), and WAGO PFC100 Firmware version 03.00.39(12) and version 03.02.02(14).",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
]
},
"remediations": [
{
"category": "mitigation",
"details": "- Follow the instructions in WAGOs handbook Cyber Security for Controller\n- Restrict network access to the device.\n- Do not directly connect the device to the internet\n\nDue to the limited resources on the embedded device, it is necessary to protect it from unauthorized access such as denial of service attacks.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
]
}
],
"title": "CVE-2019-5149"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…