WAGO PFC200 Series

Low RiskCVSS 2.7ICS-CERT ICSA-23-325-01Oct 23, 2023
WAGO
Attack path
Attack VectorNetwork
Auth RequiredHigh
ComplexityLow
User InteractionNone needed
Summary

WAGO PFC200 series controllers and Touch Panel devices (firmware versions FW16 through FW26) contain an undocumented file access method that allows an attacker with administrative privileges to read sensitive files outside of intended boundaries, potentially exposing configuration data and system information. CWE-610 (Insufficient Abstraction). The vulnerability affects PFC200, PFC100, Compact Controller CC100, Edge Controller, and multiple Touch Panel 600 variants across the specified firmware range.

What this means
What could happen
An attacker with administrative access to a WAGO controller or panel could read sensitive configuration files or other restricted data that should not be accessible, potentially exposing system settings or credentials.
Who's at risk
Water utilities, power systems, and industrial facilities using WAGO PFC200, PFC100, Compact Controller CC100, Edge Controller, or Touch Panel 600 series devices for process automation and monitoring. This affects any organization relying on these controllers for machine-to-machine logic, data logging, or supervisory functions.
How it could be exploited
An attacker must first obtain administrative privileges on the device (through credential compromise, physical access, or other means), then exploit an undocumented access method to read files outside intended boundaries. This requires being authenticated to the device first.
Prerequisites
  • Administrative credentials for the WAGO device
  • Network or local access to the device management interface or API
  • Knowledge of the undocumented file access method
No authentication required after initial admin accessLow complexity attackNo patch available for affected firmware versionsAffects data confidentiality
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (31)
7 with fix24 pending
ProductAffected VersionsFix Status
Touch Panel 600 Standard Line: >FW16_up_to_and_including_FW26>FW16 up to and including FW26FW27+
Compact Controller CC100: >FW19_up_to_and_including_FW26>FW19 up to and including FW26FW27+
Edge Controller: >FW18_up_to_and_including_FW26>FW18 up to and including FW26FW27+
PFC100: >FW16_up_to_and_including_FW26>FW16 up to and including FW26FW27+
PFC200: >FW16_up_to_and_including_FW26>FW16 up to and including FW26FW27+
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDRestrict network access to WAGO device management interfaces using firewall rules—limit administrative access to engineering workstations and approved subnets only
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HOTFIXUpdate firmware to FW27 or later on all affected WAGO controllers and panels
HARDENINGReview and rotate administrative credentials for all WAGO devices to limit impact of potential account compromise
Long-term hardening
0/1
HARDENINGImplement network segmentation to prevent untrusted networks from reaching WAGO devices directly
API: /api/v1/advisories/0fd4d482-2a69-4db1-8950-5153b3796642

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.