VDE-2024-054
Vulnerability from csaf_endresshauserag - Published: 2024-10-21 08:00 - Updated: 2025-05-22 13:03The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise. users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise. users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.
The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.
A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Quentin Kaiser"
],
"organization": "ONEKEY",
"summary": "reporting the CVE-2023-1698",
"urls": [
"https://onekey.com"
]
},
{
"names": [
"Ryan Pickren"
],
"organization": "Georgia Institute of Technology\u0027s Cyber-Physical Security Lab",
"summary": "reporting the other vulnerabilities"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Several vulnerabilities have been identified in the web-based management of WAGO devices utilized in\nEndress+Hauser IoT solutions. WAGO has provided fixes for these vulnerabilities, which have been\nintegrated into the solutions by Endress+Hauser. Additionally, a guideline on secure operation of these\nsolutions has been made available.",
"title": "Summary"
},
{
"category": "description",
"text": "With Cross-Site-Scripting it would be possible to attack a user\u0027s Web Browser, thereby potentially leaking\ndata, including personal and device data, to other 3rd parties. In case of leaked backup data, then credentials\nused to authenticate with the remote services are also compromised.\\\nIf the attacker has physical access to the component, then\n* The devices connected to the components may no longer be available in Netilion.\n* The data received by Netilion from the connected devices could be manipulated data.\n* The components could be a vector in other cyber-attacks.\n* Data from the components and connected devices could be leaked to 3rd parties.",
"title": "Impact"
},
{
"category": "description",
"text": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"title": "Mitigation"
},
{
"category": "description",
"text": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"title": "Remediation"
},
{
"category": "general",
"text": "Endress+Hauser recommends using the solutions only in a secure environment and to allow access to their components only to authorized persons.\\\nIn this context, Endress+Hauser characterizes a secure environment as follows:\n1. The secure environment consists of three domains:\n - Operational Technology (OT), here: Network for process automation.\n - Information Technology (IT), here: Corporate network for information processing and with Internet connection.\n - Netilion Cloud: Endress+Hauser\u0027s cloud based IIoT ecosystem.\n2. The edge device and its connected field devices are in the OT domain.\n - Information is transferred from the edge device to the IT domain.\n3. The communication between the OT domain and the IT domain should be protected by a firewall.\n4. The communication between the IT domain and the Netilion Cloud should be protected by a firewall.",
"title": "General Recommendations"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@endress.com",
"name": "Endress+Hauser AG",
"namespace": "https://www.endress.com"
},
"references": [
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Endress+Hauser",
"url": "https://certvde.com/en/advisories/vendor/endress+hauser"
},
{
"category": "self",
"summary": "VDE-2024-054: Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities - HTML",
"url": "https://certvde.com/en/advisories/VDE-2024-054"
},
{
"category": "self",
"summary": "VDE-2024-054: Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities - CSAF",
"url": "https://endress-hauser.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-054.json"
}
],
"title": "Endress+Hauser: Netilion Network Insights is affected by multiple vulnerabilities",
"tracking": {
"aliases": [
"VDE-2024-054"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2024-10-21T07:08:20.983Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.12"
}
},
"id": "VDE-2024-054",
"initial_release_date": "2024-10-21T08:00:00.000Z",
"revision_history": [
{
"date": "2024-10-21T08:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2024-11-06T11:27:01.000Z",
"number": "2",
"summary": "Fix: correct certvde domain, added self-reference"
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: version space, quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Compact Controller CC 100 (751-9301) ",
"product": {
"name": "Endress+Hauser Compact Controller CC 100 (751-9301) ",
"product_id": "CSAFPID-11001"
}
},
{
"category": "product_name",
"name": "PFC 200 (750-82xx/xxx-xxx) ",
"product": {
"name": "Endress+Hauser PFC 200 (750-82xx/xxx-xxx) ",
"product_id": "CSAFPID-11002"
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version",
"name": "FW20",
"product": {
"name": "Endress+Hauser FW20",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "FW23",
"product": {
"name": "Endress+Hauser FW23",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "FW17",
"product": {
"name": "Endress+Hauser FW17",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version",
"name": "FW22",
"product": {
"name": "Endress+Hauser FW22",
"product_id": "CSAFPID-21004"
}
},
{
"category": "product_version",
"name": "FW25",
"product": {
"name": "Endress+Hauser FW25",
"product_id": "CSAFPID-22001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Endress+Hauser"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"summary": "Fixed products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW20 installed on Endress+Hauser Compact Controller CC 100 (751-9301)",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW23 installed on Endress+Hauser Compact Controller CC 100 (751-9301)",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21002",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW17 installed on Endress+Hauser PFC 200 (750-82xx/xxx-xxx)",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW22 installed on Endress+Hauser PFC 200 (750-82xx/xxx-xxx)",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21004",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW25 installed on Endress+Hauser Compact Controller CC 100 (751-9301)",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Endress+Hauser FW25 installed on Endress+Hauser PFC 200 (750-82xx/xxx-xxx)",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ryan Pickren"
],
"organization": "Georgia Institute of Technology\u0027s Cyber-Physical Security Lab",
"summary": "reporting"
}
],
"cve": "CVE-2022-45138",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated\nusers should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device\nparameters that can lead to full compromise of the device.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-45138"
},
{
"acknowledgments": [
{
"names": [
"Ryan Pickren"
],
"organization": "Georgia Institute of Technology\u0027s Cyber-Physical Security Lab",
"summary": "reporting"
}
],
"cve": "CVE-2022-45140",
"cwe": {
"id": "CWE-306",
"name": "Missing Authentication for Critical Function"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could\nlead to unauthenticated remote code execution and full system compromise.\nusers should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device\nparameters that can lead to full compromise of the device.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-45140"
},
{
"acknowledgments": [
{
"names": [
"Quentin Kaiser"
],
"organization": "ONEKEY",
"summary": "reporting",
"urls": [
"https://onekey.com"
]
}
],
"cve": "CVE-2023-1698",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the\ndevice configuration which can result in unintended behaviour, Denial of Service and full system compromise.\nusers should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device\nparameters that can lead to full compromise of the device.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2023-1698"
},
{
"acknowledgments": [
{
"names": [
"Ryan Pickren"
],
"organization": "Georgia Institute of Technology\u0027s Cyber-Physical Security Lab",
"summary": "reporting"
}
],
"cve": "CVE-2022-45137",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that\ntargets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.1,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.1,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-45137"
},
{
"acknowledgments": [
{
"names": [
"Ryan Pickren"
],
"organization": "Georgia Institute of Technology\u0027s Cyber-Physical Security Lab",
"summary": "reporting"
}
],
"cve": "CVE-2022-45139",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic\ninformation pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like\nCPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of\nconfidentiality.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "If an immediate firmware update is not possible, the only way to prevent an attack is to prevent the access of\nthe Web Based Management tool from the internet. This can be achieved by using a network element, such\nas a router, which hides and secures the components from the internet.",
"group_ids": [
"CSAFGID-0001"
]
},
{
"category": "vendor_fix",
"details": "Endress+Hauser provides updated firmware versions for the related components from WAGO which fixes the\nvulnerability. Endress+Hauser strongly recommends customers to update to the new fixed version. For\nsupport, please contact your local service center.",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2022-45139"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.