VDE-2026-010
Vulnerability from csaf_wagogmbhcokg - Published: 2026-03-30 07:00 - Updated: 2026-03-30 07:00Summary
WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere
Severity
Critical
Notes
Summary: Multiple vulnerabilities have been identified in WAGO Solution Builder and WAGO Device Sphere that affect components responsible for authentication and system communication.
Impact: The identified vulnerabilities could enable unauthorized parties to gain access to protected system areas or bypass intended security controls. This may expose sensitive data and reduce overall system trustworthiness if not promptly addressed.
Remediation: Update to WAGO Device Sphere version 1.2.2. and WAGO Solution Builder version 2.4.2
An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.
7.5 (High)
Vendor Fix
Update to WAGO Device Sphere version 1.2.2. and WAGO Solution Builder version 2.4.2
Inconsistent interpretation of http requests ('http request/response smuggling') in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.
9.9 (Critical)
Vendor Fix
Update to version 2.4.2 of the WAGO Solution Builder.
https://downloadcenter.wago.com/wago/software/det…
References
Acknowledgments
CERTVDE
certvde.com
SySS GmbH
Marvin Ramsperger
{
"document": {
"acknowledgments": [
{
"organization": "CERTVDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Marvin Ramsperger"
],
"organization": "SySS GmbH",
"summary": "reporting"
}
],
"aggregate_severity": {
"namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple vulnerabilities have been identified in WAGO Solution Builder and WAGO Device Sphere that affect components responsible for authentication and system communication.",
"title": "Summary"
},
{
"category": "description",
"text": "The identified vulnerabilities could enable unauthorized parties to gain access to protected system areas or bypass intended security controls. This may expose sensitive data and reduce overall system trustworthiness if not promptly addressed.",
"title": "Impact"
},
{
"category": "description",
"text": "Update to WAGO Device Sphere version 1.2.2. and WAGO Solution Builder version 2.4.2",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@wago.com",
"name": "WAGO GmbH \u0026 Co. KG",
"namespace": "https://www.wago.com/psirt"
},
"references": [
{
"category": "self",
"summary": "WAGO PSIRT",
"url": "https://www.wago.com/de-en/automation-technology/psirt"
},
{
"category": "external",
"summary": "CERT@VDE Security Advisories for WAGO",
"url": "https://certvde.com/de/advisories/vendor/wago/"
},
{
"category": "self",
"summary": "VDE-2026-010: WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere - HTML",
"url": "https://certvde.com/en/advisories/VDE-2026-010"
},
{
"category": "self",
"summary": "VDE-2026-010: WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere - CSAF",
"url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-010.json"
}
],
"title": "WAGO: Multiple Vulnerabilities in WAGO Solution Builder and WAGO Device Sphere",
"tracking": {
"aliases": [
"VDE-2026-010"
],
"current_release_date": "2026-03-30T07:00:00.000Z",
"generator": {
"date": "2026-03-26T10:18:28.328Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.44"
}
},
"id": "VDE-2026-010",
"initial_release_date": "2026-03-30T07:00:00.000Z",
"revision_history": [
{
"date": "2026-03-30T07:00:00.000Z",
"number": "1.0.0",
"summary": "Initial release."
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:generic/\u003c1.2.2",
"product": {
"name": "WAGO Device Sphere \u003c 1.2.2",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "1.2.2",
"product": {
"name": "WAGO Device Sphere 1.2.2",
"product_id": "CSAFPID-22001",
"product_identification_helper": {
"cpe": "cpe:2.3:o:wago:device_sphere:1.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "1.2.1",
"product": {
"name": "WAGO Device Sphere 1.2.1",
"product_id": "CSAFPID-21003",
"product_identification_helper": {
"cpe": "cpe:2.3:o:wago:device_sphere:1.2.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Device Sphere"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:generic/\u003c2.4.2",
"product": {
"name": "WAGO Solution Builder \u003c 2.4.2",
"product_id": "CSAFPID-21002"
}
},
{
"category": "product_version",
"name": "2.4.2",
"product": {
"name": "WAGO Solution Builder 2.4.2",
"product_id": "CSAFPID-22002",
"product_identification_helper": {
"cpe": "cpe:2.3:o:wago:solution_builder:2.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_version",
"name": "2.4.1",
"product": {
"name": "WAGO Solution Builder 2.4.1",
"product_id": "CSAFPID-21004",
"product_identification_helper": {
"cpe": "cpe:2.3:o:wago:solution_builder:2.4.1:*:*:*:*:*:*:*"
}
}
}
],
"category": "product_name",
"name": "Solution Builder"
}
],
"category": "product_name",
"name": "Software"
}
],
"category": "vendor",
"name": "WAGO"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-21001",
"CSAFPID-21002",
"CSAFPID-21003",
"CSAFPID-21004"
],
"summary": "Affected products"
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-22001",
"CSAFPID-22002"
],
"summary": "Fixed products"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2026-2328",
"cwe": {
"id": "CWE-790",
"name": "Improper Filtering of Special Elements"
},
"notes": [
{
"category": "description",
"text": "An unauthenticated remote attacker can exploit insufficient input validation to access backend components beyond their intended scope via path traversal, resulting in exposure of sensitive information.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-22001",
"CSAFPID-22002"
],
"known_affected": [
"CSAFPID-21001",
"CSAFPID-21002",
"CSAFPID-21003",
"CSAFPID-21004"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2025-06-05T09:00:00.000Z",
"details": "Update to WAGO Device Sphere version 1.2.2. and WAGO Solution Builder version 2.4.2",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-21001",
"CSAFPID-21002",
"CSAFPID-21003",
"CSAFPID-21004"
]
}
],
"title": "Backend Access Due to Insufficient Input Validation"
},
{
"cve": "CVE-2025-55315",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "description",
"text": "Inconsistent interpretation of http requests (\u0027http request/response smuggling\u0027) in ASP.NET Core allows an authorized attacker to bypass a security feature over a network.",
"title": "CVE Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-22002"
],
"known_affected": [
"CSAFPID-21002"
]
},
"remediations": [
{
"category": "vendor_fix",
"date": "2026-02-26T14:00:00.000Z",
"details": "Update to version 2.4.2 of the WAGO Solution Builder.",
"product_ids": [
"CSAFPID-21002",
"CSAFPID-21004"
],
"url": "https://downloadcenter.wago.com/wago/software/details/ml0xpukz3zpftjwo9mx"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.9,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 9.9,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-21002"
]
}
],
"title": "ASP.NET Security Feature Bypass Vulnerability"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…