Wago: Vulnerability in WBM through Open VPN
A vulnerability exists in the Web-Based Management (WBM) function when OpenVPN is enabled on WAGO industrial controllers. An authenticated attacker with administrative privileges can exploit improper privilege handling in OpenVPN to escalate access and execute arbitrary code. The vulnerability affects CC100, PFC100/G1/G2, PFC200/G1/G2, TP600, Edge Controller, and WP400 devices running firmware version 4.5.10 or earlier. WAGO has indicated no patch will be released; mitigation involves disabling OpenVPN if not required and properly configuring privilege-dropping settings per the WAGO I/O System 750/753 manual section 7.1.1.5.1.
- High-privilege (administrative) credentials for WBM access
- OpenVPN must be enabled on the device
- Network access to the WBM interface (typically HTTP/HTTPS on the controller)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e1fb6d57-31d8-4645-93ec-c4fe040ac8b3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.