Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-45139: VDE-2022-060 | CERT@VDE

A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.

CVE
#xss#vulnerability#web#rce#auth

2023-02-27 12:00 (CET) VDE-2022-060

WAGO: Multiple vulnerabilities in web-based management of multiple products
Share: Email | Twitter

**

Published

**

2023-02-27 12:00 (CET)

**

Last update

**

2023-02-27 15:35 (CET)

Vendor(s)

WAGO GmbH & Co. KG

Product(s)

Article No°

Product Name

Affected Version(s)

751-9301

Compact Controller CC100

FW16 <= FW22

751-9301

Compact Controller CC100

= FW23

752-8303/8000-002

Edge Controller

= FW23

752-8303/8000-002

Edge Controller

FW18 <= FW22

750-81xx/xxx-xxx

PFC100

FW16 <= FW22

750-81xx/xxx-xxx

PFC100

= FW23

750-82xx/xxx-xxx

PFC200

FW16 <= FW22

750-82xx/xxx-xxx

PFC200

= FW23

762-5xxx

Touch Panel 600 Advanced Line

FW16 <= FW22

762-5xxx

Touch Panel 600 Advanced Line

= FW23

762-6xxx

Touch Panel 600 Marine Line

FW16 <= FW22

762-6xxx

Touch Panel 600 Marine Line

= FW23

762-4xxx

Touch Panel 600 Standard Line

FW16 <= FW22

762-4xxx

Touch Panel 600 Standard Line

= FW23

**

Summary

**

The Web-Based Management (WBM) of WAGOs programmable logic controller (PLC) is typically used for administration, commissioning and updates.

The configuration backend can in some cases be used without authentication and to write data with root privileges. Additionally, the web-based management suffers a CORS misconfiguration and allows reflected XSS (Cross-Site Scripting) attacks.

**

Vulnerabilities

**

Last Update

Feb. 13, 2023, 4:24 p.m.

Weakness

Missing Authentication for Critical Function (CWE-306)

Summary

The configuration backend of the web-based management can be used by unauthenticated users, although only authenticated users should be able to use the API. The vulnerability allows an unauthenticated attacker to read and set several device parameters that can lead to full compromise of the device.

Last Update

Feb. 13, 2023, 4:25 p.m.

Weakness

Missing Authentication for Critical Function (CWE-306)

Summary

The configuration backend allows an unauthenticated user to write arbitrary data with root privileges to the storage, which could lead to unauthenticated remote code execution and full system compromise.

Last Update

Feb. 13, 2023, 4:24 p.m.

Weakness

Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) (CWE-79)

Summary

The configuration backend of the web-based management is vulnerable to reflected XSS (Cross-Site Scripting) attacks that targets the users browser. This leads to a limited impact of confidentiality and integrity but no impact of availability.

Last Update

Feb. 13, 2023, 4:24 p.m.

Summary

A CORS Misconfiguration in the web-based management allows a malicious third party webserver to misuse all basic information pages on the webserver. In combination with CVE-2022-45138 this could lead to disclosure of device information like CPU diagnostics. As there is just a limited amount of information readable the impact only affects a small subset of confidentiality.

**

Impact

**

The web-based management of affected products is vulnerable to Reflective Cross-Site Scripting. This can be used to install malicious code and to gain access to confidential information on a System that connects to the WBM after it has been compromised.

Additionally, the web-based management of affected products is vulnerable to stealing and setting device parameters and remote code execution by an unauthenticated attacker.

**

Solution

**

Mitigation

  • If not needed, you can deactivate the web-based management to prevent attacks (command line)
  • Restrict network access to the device.
  • Do not directly connect the device to the internet

Remediation

We recommend all users of affected products to install FW22 Patch 1 or FW 24 or higher.

**

Reported by

**

These vulnerabilities were reported to WAGO by Ryan Pickren from Georgia Institute of Technology’s Cyber-Physical Security Lab
Coordination done by CERT@VDE.

Related news

Researchers Uncover Over a Dozen Security Flaws in Akuvox E11 Smart Intercom

More than a dozen security flaws have been disclosed in E11, a smart intercom product made by Chinese company Akuvox. "The vulnerabilities could allow attackers to execute code remotely in order to activate and control the device's camera and microphone, steal video and images, or gain a network foothold," Claroty security researcher Vera Mens said in a technical write-up. Akuvox E11 is

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907