VDE-2020-010
Vulnerability from csaf_wagogmbhcokg - Published: 2020-03-09 09:25 - Updated: 2020-03-09 09:25Summary
WAGO: Cloud Connectivity Remote Code Execution Vulnerability
Notes
Summary: An attacker needs an authorized login with administrative privileges on the device in order to exploit the herein mentioned vulnerability.
The weakness allows an attacker which has admin privileges on the device to redirect to his own Azure cloud account and install malicious software with the firmware update functionality.
Impact: These vulnerabilities allow an attacker which has admin privileges, an Azure cloud account and also access to the device to redirect the cloud connection. With thus he is able to install any malicious software by manipulating the firmware update file.
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of affected WAGO products. A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.
Mitigation: Check the hashes of the Update packet, do not use update files which has a different hash then the original one
Follow the instructions in WAGOs handbook Cyber Security for Controller
Restrict network access to the device.
Do not directly connect the device to the internet
Use an encrypted VPN connection to the device
Disable unused TCP/UDP-ports
Use strong passwords for all user accounts, especially for administrative user accounts on the device.
An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.
9.1 (Critical)
Mitigation
Check the hashes of the Update packet, do not use update files which has a different hash then the original one
Follow the instructions in WAGOs handbook Cyber Security for Controller
Restrict network access to the device.
Do not directly connect the device to the internet
Use an encrypted VPN connection to the device
Disable unused TCP/UDP-ports
Use strong passwords for all user accounts, especially for administrative user accounts on the device.
References
Acknowledgments
CERT@VDE
certvde.com
Cisco Talos
Kelly Leuschner
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Kelly Leuschner"
],
"organization": "Cisco Talos",
"summary": "reporting"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "An attacker needs an authorized login with administrative privileges on the device in order to exploit the herein mentioned vulnerability.\nThe weakness allows an attacker which has admin privileges on the device to redirect to his own Azure cloud account and install malicious software with the firmware update functionality.",
"title": "Summary"
},
{
"category": "description",
"text": "These vulnerabilities allow an attacker which has admin privileges, an Azure cloud account and also access to the device to redirect the cloud connection. With thus he is able to install any malicious software by manipulating the firmware update file.\n\nAn exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of affected WAGO products. A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.",
"title": "Impact"
},
{
"category": "description",
"text": "Check the hashes of the Update packet, do not use update files which has a different hash then the original one\nFollow the instructions in WAGOs handbook Cyber Security for Controller\nRestrict network access to the device.\nDo not directly connect the device to the internet\nUse an encrypted VPN connection to the device\nDisable unused TCP/UDP-ports\n\nUse strong passwords for all user accounts, especially for administrative user accounts on the device.",
"title": "Mitigation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Wago",
"url": "https://certvde.com/en/advisories/vendor/wago"
},
{
"category": "self",
"summary": "VDE-2020-010: WAGO: Cloud Connectivity Remote Code Execution Vulnerability - HTML",
"url": "https://certvde.com/en/advisories/VDE-2020-010"
},
{
"category": "self",
"summary": "VDE-2020-010: WAGO: Cloud Connectivity Remote Code Execution Vulnerability - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2020/vde-2020-010.json"
}
],
"title": "WAGO: Cloud Connectivity Remote Code Execution Vulnerability",
"tracking": {
"aliases": [
"VDE-2020-010"
],
"current_release_date": "2020-03-09T09:25:00.000Z",
"generator": {
"date": "2025-03-20T08:55:11.026Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.21"
}
},
"id": "VDE-2020-010",
"initial_release_date": "2020-03-09T09:25:00.000Z",
"revision_history": [
{
"date": "2020-03-09T09:25:00.000Z",
"number": "1",
"summary": "Initial revision."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "750-82xx/xxx-xxx (PFC200)",
"product": {
"name": "750-82xx/xxx-xxx (PFC200)",
"product_id": "CSAFPID-11002"
}
},
{
"category": "product_name",
"name": "762-4xxx",
"product": {
"name": "762-4xxx",
"product_id": "CSAFPID-11003"
}
},
{
"category": "product_name",
"name": "762-5xxx",
"product": {
"name": "762-5xxx",
"product_id": "CSAFPID-11004"
}
},
{
"category": "product_name",
"name": "762-6xxx",
"product": {
"name": "762-6xxx",
"product_id": "CSAFPID-11005"
}
},
{
"category": "product_name",
"name": "750-81xx/xxx-xxx (PFC100)",
"product": {
"name": "750-81xx/xxx-xxx (PFC100)",
"product_id": "CSAFPID-11006"
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=FW12",
"product": {
"name": "Firmware \u003e=FW12",
"product_id": "CSAFPID-21001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "WAGO"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
],
"summary": "Affected Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003e=FW12 installed on 750-81xx/xxx-xxx (PFC100)",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003e=FW12 installed on 750-82xx/xxx-xxx (PFC200)",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003e=FW12 installed on 762-4xxx",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003e=FW12 installed on 762-5xxx",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003e=FW12 installed on 762-6xxx",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5161",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Check the hashes of the Update packet, do not use update files which has a different hash then the original one\nFollow the instructions in WAGOs handbook Cyber Security for Controller\nRestrict network access to the device.\nDo not directly connect the device to the internet\nUse an encrypted VPN connection to the device\nDisable unused TCP/UDP-ports\n\nUse strong passwords for all user accounts, especially for administrative user accounts on the device.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.1,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"temporalScore": 9.1,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005"
]
}
],
"title": "CVE-2019-5161"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…