Share: Email | Twitter




2021-08-31 09:00 (CEST)

Last update

2021-08-31 09:00 (CEST)


WAGO GmbH & Co. KG


Article No┬░ Product Name Affected Version(s)
750-831/xxx-xxx FW4 <= FW15
750-880/xxx-xxx FW4 <= FW15
750-881 FW4 <= FW15
750-889 FW4 <= FW15


WAGO controllers have always been designed for easy connection to IT infrastructure. Even controllers from legacy product lines support encryption standards to ensure secure communication.
With special crafted requests it is possible to bring the device out of operation.
All listed devices are vulnerable for this denial of service attack.

Last Update:

Sept. 8, 2021, 9:44 a.m.


Missing Release of Resource after Effective Lifetime  (CWE-772) 


Missing Release of Resource after Effective Lifetime vulnerability in OpenSSL implementation of WAGO 750-831/xxx-xxx, 750-880/xxx-xxx, 750-881, 750-889 in versions FW4 up to FW15 allows an unauthenticated attacker to cause DoS on the device.


This vulnerability allows an attacker who has access to the device to send a series of maliciously constructed packets which can bring the device out of operation. The device needs a power on reset to go back to normal operation.


Update the device to the latest FW version.


  • Restrict network access to the device.
  • Do not directly connect the device to the internet
  • Disable unused TCP/UDP-ports
  • Disable Web Based Management ports 80/443 after configuration phase.

Reported by

These vulnerabilities were reported to WAGO by: Uwe Disch,
Coordination done by CERT@VDE.