WAGO: Cloud Connectivity Remote Code Execution Vulnerability
WAGO PFC100, PFC200, and 762 series controllers with firmware version 12 and later contain a vulnerability in cloud connectivity that allows an authenticated administrator to redirect the device to a malicious Azure cloud account. An attacker with admin credentials can then deploy unauthorized firmware updates to execute arbitrary code on the controller. This affects the device's ability to perform its intended industrial control functions and could allow manipulation of setpoints, process parameters, or system operation.
- Valid administrative account credentials on the WAGO device
- Network access to the controller's administrative interface (typically local network or VPN)
- Access to configure cloud connectivity and firmware update settings
Patching may require device reboot — plan for process interruption
/api/v1/advisories/01e3e471-55ed-4aac-8806-aec255715f3eGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.