Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-1620: VDE-2023-006 | CERT@VDE

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.

CVE
#vulnerability#web#dos#pdf#auth

2023-06-25 08:00 (CEST) VDE-2023-006

WAGO: Controller with CODESYS 2.3 Runtime Denial-of-Service
Share: Email | Twitter

**

Published

**

2023-06-25 08:00 (CEST)

**

Last update

**

2023-06-23 07:03 (CEST)

Vendor(s)

WAGO GmbH & Co. KG

**

Summary

**

An authenticated attacker can send a malformed packet to trigger a device crash via the CODESYS V2 runtime commands parsing.

**

Vulnerabilities

**

Last Update

June 20, 2023, 4:40 p.m.

Weakness

Improper Input Validation (CWE-20)

Summary

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a malformed packet.

Last Update

June 20, 2023, 4:42 p.m.

Weakness

Improper Input Validation (CWE-20)

Summary

Multiple WAGO devices in multiple versions may allow an authenticated remote attacker with high privileges to DoS the device by sending a specifically crafted packet to the CODESYS V2 runtime.

**

Impact

**

Abusing these vulnerabilities an attacker can crash an affected product, which fully prevents the product to work as intended. After a complete restart the component works as expected.

**

Solution

**

Mitigation

If the PLC runtime is running, but you do not need it, you can deactivate the plc runtime programming port over the product settings in the web-based management. You can find this option under “Configuration > PLC Runtime Services > CODESYS 2 > communication enabled”.

As general security measures strongly WAGO recommends:

  1. Use general security best practices to protect systems from local and network attacks.
  2. Do not allow direct access to the device from untrusted networks.
  3. Update to the latest firmware according to the table in chapter solutions.
  4. Industrial control systems (ICS) should not be directly accessible from the Internet, but should be protected by consistently applying the defense-in-depth strategy.

The BSI provides general information on securing ICS in the ICS Compendium (https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/ICS/ICS-Security_compendium.pdf).

Remediation

We recommend all effected users to update to the firmware version listed below:

Order No.

Firmware Version

PFC200 Family

750-8202/xxx-xxx

FW 22 Patch 2 available in Q4 2023

750-8203/xxx-xxx

750-8204/xxx-xxx

750-8206/xxx-xxx

750-8207/xxx-xxx

750-8208/xxx-xxx

750-8210/xxx-xxx

750-8211/xxx-xxx

750-8212/xxx-xxx

750-8213/xxx-xxx

750-8214/xxx-xxx

750-8216/xxx-xxx

750-8217/xxx-xxx

Ethernet Controller 4th Generation family

750-823

FW 11 available in early Q3 2023

750-332

750-832/xxx-xxx

750-862

750-890/xxx-xxx

750-891

750-893

Ethernet Controller 3rd Generation family

750-331

FW 17 (after BACnet certification)

750-829

750-831/xxx-xxx

750-852

FW 17 (already available)

750-880/xxx-xxx

750-881

750-882

750-885/xxx-xxx

750-889

**

Reported by

**

The vulnerability was reported by Daniel dos Santos and Abdelrahman Hassanien from Forescout.

Coordination done by CERT@VDE.

Related news

Researchers Expose New Severe Flaws in Wago and Schneider Electric OT Products

Three security vulnerabilities have been disclosed in operational technology (OT) products from Wago and Schneider Electric. The flaws, per Forescout, are part of a broader set of shortcomings collectively called OT:ICEFALL, which now comprises a total of 61 issues spanning 13 different vendors. "OT:ICEFALL demonstrates the need for tighter scrutiny of, and improvements to, processes related to

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907