Wago: Multiple vulnerabilities in web-based management of multiple products
Multiple cross-site-scripting vulnerabilities exist in the web-based management interface of WAGO programmable logic controllers. These vulnerabilities allow attackers to inject malicious scripts via configuration data, potentially leading to remote code execution. The vulnerabilities affect several WAGO controller models across firmware versions FW13 and earlier. Fixes are available for some product lines (Ethernet Controller 3rd Gen and Fieldbus Coupler Ethernet 3rd Gen via FW14), but controllers with BACnet/IP and BACnet MS/TP protocols have no fix planned.
- Network access to the web-based management port (typically port 80/443)
- User with access to the WBM interface must view or interact with the malicious content
- WBM must be enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9d85e63f-ef2a-44a8-96c4-b40494dcc38aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.