Share: Email | Twitter

ID

VDE-2020-036

Published

2021-06-29 12:00 (CEST)

Last update

2021-07-07 13:53 (CEST)

Vendor(s)

WAGO

Product(s)

All FW versions <= FW18 Patch 2 of the following products are affected:

  • Series PFC100 (750-81xx/xxx-xxx)
  • Series PFC200 (750-82xx/xxx-xxx)
  • Series Wago Edge Controller 752-8303/8000-0002
  • Series Wago Touch Panel 600 Standard Line (762-4xxx)
  • Series Wago Touch Panel 600 Advanced Line (762-5xxx)
  • Series Wago Touch Panel 600 Marine Line (762-6xxx)

Summary

Multiple vulnerabilities in the WAGO I/O-Check Service were reported.

Vulnerabilities



Weakness
Out-of-bounds Write (CWE-787)
Summary

An attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.

Weakness
Shared Memory Overflow (CWE-120)
Summary

An attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory.

Weakness
Out-of-bounds Read (CWE-125)
Summary

An attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an out-of-bounds read.

Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
Summary

An attacker can send a specially crafted packet containing OS commands to provoke a denial of service.

Impact

By exploiting the described vulnerabilities, the attacker potentially is able to manipulate or disrupt the device.

Solution

Mitigation

  • Disable I/O-Check service
  • Restrict network access to the device.
  • Do not directly connect the device to the internet.

Solution

The I/O-Check service protocol is only needed during installation and commissioning, not during normal operations. It is highly recommended to disable the I/O-Check service after commissioning. This is the easiest and securest way to protect your device from the listed vulnerabilities and possible upcoming zero-day exploits.
Regardless to the action described above, the vulnerability has been fixed in FW18 Patch 3, released in June 2021.
We recommend all affected users to update to the latest firmware version.

Reported by

These vulnerabilities were reported to WAGO by Uri Katz of Claroty. We thank CERT@VDE for the management of this coordinated disclosure.