ICSA-17-236-01_Westermo MRD-305-DIN, MRD-315, MRD-355, and MRD-455
Westermo MRD-series industrial Ethernet switches (MRD-305-DIN, MRD-315, MRD-355, MRD-455) contain multiple critical vulnerabilities in their web management interface. The devices use hardcoded credentials and are vulnerable to Cross-Site Request Forgery (CSRF) attacks, allowing unauthenticated network attackers to gain complete control. The affected firmware versions are above 1.7.5.0. No security update has been released by Westermo. These vulnerabilities allow an attacker to authenticate to the management interface without valid credentials and execute arbitrary commands on the switch, potentially compromising all network traffic passing through the device.
- Network access to the Westermo MRD device management interface
- No valid credentials required; hardcoded credentials or CSRF bypass allows unauthorized access
- Device firmware version above 1.7.5.0
Patching may require device reboot — plan for process interruption
/api/v1/advisories/5bb02c43-17b8-436f-ba1f-93ca54e6e9e9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.