Festo Didactic SE MES PC
Act Now9.8ICS-CERT ICSA-26-027-02Feb 27, 2024
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
MES PCs shipped with Windows 10 come pre-installed with XAMPP, a bundle of open-source applications including Apache HTTP Server, MariaDB database, and related tools. The bundled XAMPP version contains approximately 140 known vulnerabilities across these applications. Festo Didactic has released Factory Control Panel as a replacement application that addresses these vulnerabilities. MES PCs currently in the field with unpatched XAMPP remain vulnerable to remote code execution, authentication bypass, database manipulation, and denial of service attacks.
What this means
What could happen
An attacker could exploit multiple vulnerabilities in the bundled XAMPP applications (Apache, MariaDB, etc.) on your MES PC to execute arbitrary code, bypass authentication, access or modify databases, or cause denial of service—potentially disrupting manufacturing training and control operations.
Who's at risk
Manufacturing training facilities and any organizations running Festo MES PCs with Windows 10 for process control or monitoring. The bundled XAMPP affects any workstations that depend on the Apache web server, MariaDB database, or other included components for training simulations or data management.
How it could be exploited
An attacker with network access to the MES PC (typically on plant network) could target any of approximately 140 known vulnerabilities in the pre-installed XAMPP components. Attack vectors include malicious HTTP requests to Apache, SQL injection against MariaDB, and other application-level exploits. No authentication is required for most of these vulnerabilities.
Prerequisites
- Network access to the MES PC on the plant network
- MES PC running Windows 10 with original XAMPP installation
- No firewall rule restricting access to Apache (port 80/443) or MariaDB (port 3306)
remotely exploitableno authentication requiredlow complexityactively exploited (KEV)very high EPSS score (94.1%)affects multiple critical applications (Apache, MariaDB)approximately 140 known vulnerabilitiesdefault XAMPP configuration likely in use
Exploitability
Actively exploited — confirmed by CISA KEV
Affected products (1)
ProductAffected VersionsFix Status
MES PC shipped with Windows 10shipped with Windows 10No fix yet
Remediation & Mitigation
0/3
Do now
0/2HOTFIXContact Festo Didactic technical support (services.didactic@festo.com) to obtain and deploy Factory Control Panel as a replacement for XAMPP
WORKAROUNDIsolate the MES PC from direct network access using a firewall rule blocking inbound traffic to ports 80, 443 (Apache), and 3306 (MariaDB) until Factory Control Panel is deployed
Long-term hardening
0/1HARDENINGImplement network segmentation to place the MES PC on a separate VLAN with restricted access from other plant systems
CVEs (139)
CVE-2019-11036CVE-2023-25727CVE-2021-2011CVE-2022-32083CVE-2021-46668CVE-2018-19518CVE-2021-2194CVE-2019-11049CVE-2022-31626CVE-2022-32084CVE-2022-32088CVE-2022-27377CVE-2020-2922CVE-2019-9638CVE-2019-11044CVE-2020-7068CVE-2020-7069CVE-2015-2301CVE-2023-0568CVE-2022-27458CVE-2021-21706CVE-2022-27452CVE-2020-7071CVE-2022-27387CVE-2022-27376CVE-2019-11043CVE-2021-2032CVE-2021-2007CVE-2019-11045CVE-2022-27445CVE-2022-27457CVE-2022-27384CVE-2022-23808CVE-2023-0567CVE-2019-9025CVE-2022-27379CVE-2019-9637CVE-2021-27928CVE-2021-21703CVE-2020-2760CVE-2021-2166CVE-2015-2787CVE-2022-23807CVE-2020-2752CVE-2021-46666CVE-2020-2814CVE-2020-7065CVE-2021-21705CVE-2020-7062CVE-2019-11039CVE-2019-11035CVE-2022-27447CVE-2019-11046CVE-2022-27446CVE-2022-27386CVE-2019-9639CVE-2019-11042CVE-2022-27385CVE-2020-7059CVE-2020-7070CVE-2022-32091CVE-2015-2348CVE-2019-9020CVE-2021-35604CVE-2022-27444CVE-2018-14883CVE-2014-9705CVE-2020-7064CVE-2022-27382CVE-2020-7063CVE-2021-2372CVE-2019-9021CVE-2018-14851CVE-2022-27448CVE-2021-46663CVE-2021-2180CVE-2014-9709CVE-2023-25690CVE-2022-32082CVE-2022-31629CVE-2019-9022CVE-2016-3078CVE-2023-0662CVE-2021-2022CVE-2022-32089CVE-2019-11048CVE-2021-46669CVE-2019-11047CVE-2022-27383CVE-2021-46667CVE-2022-32087CVE-2022-36760CVE-2020-7060CVE-2018-17082CVE-2019-9640CVE-2021-46661CVE-2019-11034CVE-2022-27456CVE-2020-7061CVE-2022-27455CVE-2021-2144CVE-2021-2154CVE-2022-21595CVE-2019-11040CVE-2021-2389CVE-2023-27522CVE-2020-2812CVE-2021-46665CVE-2022-32086CVE-2022-32085CVE-2021-21704CVE-2020-7066CVE-2022-31628CVE-2021-46662CVE-2016-5385CVE-2022-37436CVE-2013-6501CVE-2021-21702CVE-2019-9024CVE-2019-9023CVE-2022-27449CVE-2021-46664CVE-2019-11050CVE-2021-21708CVE-2022-31625CVE-2022-32081CVE-2022-27378CVE-2006-20001CVE-2018-19935CVE-2022-4900CVE-2018-12882CVE-2019-9641CVE-2022-27380CVE-2022-27381CVE-2021-21707CVE-2022-27451CVE-2020-2780CVE-2019-11041CVE-2021-2174
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/5979067b-90fb-4de8-8c9f-f9587ee17181