WAGO: Multiple vulnerabilities in docker configuration
Nozomi Networks disclosed eight vulnerabilities in WAGO industrial controllers affecting Docker configuration and runtime access control. The vulnerabilities stem from improper file permissions (CWE-732), missing access controls (CWE-306), and path traversal issues (CWE-22) that allow authenticated users with engineering credentials to escalate privileges and execute arbitrary code with root access on PFC100, TP600, CC100, and Edge Controller devices running firmware versions 4.5.10 or earlier (or 3.10.10 for G1 models). The vulnerabilities affect the CODESYS Runtime environment and Linux user group membership, enabling attackers to modify control logic, alter process setpoints, or disrupt operations.
- Network access to CODESYS Runtime port (typically 2455)
- Valid engineering workstation credentials (username/password)
- Controller must be running affected firmware version ≤4.5.10 (most models) or ≤3.10.10 (G1 devices) or ≤4.5.10 (CC100)
- Root or administrative access to the Linux shell on the controller
Patching may require device reboot — plan for process interruption
/api/v1/advisories/14dc4655-fd4d-4531-8109-19af3f4c0cc3Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.