WAGO: Multiple Vulnerabilities in the Web-Based Management Interface
Multiple vulnerabilities in WAGO industrial managed switches Web-Based Management (WBM) interface allow an attacker with access to the device to install malware, access password hashes, and create administrative user accounts. Affected are models 0852-0303, 0852-1305, 0852-1505 and their variants across multiple firmware versions. Vulnerabilities include missing authentication controls, insecure password storage, cleartext transmission, and cross-site scripting. The WBM is typically used for administration and commissioning only and is not needed during normal operations.
- Network access to the WBM HTTP service on the switch (typically port 80)
- Physical or logical network connectivity to the switch's management interface
- Device must be accessible from the attacker's network segment (no air-gap isolation)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/15e05f8b-a60b-4f05-816a-486c6eaae254Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.