WAGO: Vulnerabilities in WAGO Device Manager
Cross-origin request forgery (CORS) and unauthenticated file system access vulnerabilities exist in WAGO Device Manager embedded firmware. The Device Manager web interface fails to validate request origins (CWE-942) and does not enforce authentication on certain endpoints (CWE-306), allowing an attacker to read files from the controller filesystem or set arbitrary HTTP headers. Affected products include PFC100/PFC200 G1 and G2 controllers, TP600 panel computers, CC100 controllers, and Edge Controller 0752-8303. Only G1 models have vendor patches available; G2, TP600, and Edge Controller models are end-of-life with no fixes planned.
- Network access to the WAGO Device Manager web interface (default port 8080 or 80)
- No authentication required
- Device is reachable from attacker's network or the attacker can trick a user to visit a malicious webpage
Patching may require device reboot — plan for process interruption
/api/v1/advisories/17e9ce4d-46ab-4e0c-9cbc-a557d4ec1cafGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.