WAGO: Vulnerability in hardware switch circuit

MonitorCVSS 6.5VDE-2025-083Sep 15, 2025
WAGO
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

A hardware defect in the Ethernet switch circuit affects WAGO Edge Controllers, Touch Panels TP600, and Compact Controllers CC100. The vulnerability is caused by a PullUp resistor at the reset input that can lead to premature activation and undefined operation. Remediation requires upgrading to firmware version 04.08.05 or later on compatible hardware revisions. Two product models (TP600 0762-4302/8000-0002 and TP600 0762-5204/8000-0001) have no fix available and may require hardware replacement.

What this means
What could happen
A hardware defect in the Ethernet switch circuit can cause premature activation and undefined operation of WAGO edge controllers, touch panels, and compact controllers, potentially leading to loss of communication or unpredictable control behavior.
Who's at risk
Water utilities and municipal electric utilities that use WAGO Edge Controllers (0752-8303/8000-0002), Touch Panel TP600 series (0762-41xx, 0762-42xx, 0762-43xx, 0762-51xx, 0762-52xx, 0762-53xx), and Compact Controllers CC100 (0751-93xx, 0751-94xx) for remote monitoring, data acquisition, and control automation are affected by this vulnerability.
How it could be exploited
An attacker on the network would not actively exploit this vulnerability; rather, it presents a reliability and availability risk due to the hardware design flaw. The PullUp resistor at the reset input can be triggered by environmental conditions or electrical noise, causing the switch to malfunction and potentially isolate the device from the network or cause it to enter an undefined state.
Prerequisites
  • Physical proximity to the device or network conditions that induce electrical noise on the reset line
  • No authentication required—the vulnerability is triggered by circuit behavior, not user action
Hardware design flaw causes undefined operationaffects industrial automation and control equipmentno active exploitation but impacts device reliabilitytwo product models have no fix planned
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (24)
22 with fix2 pending
ProductAffected VersionsFix Status
Edge Controller 0752-8303/8000-0002 32500<04.08.0504.08.05
Hardware TP600 0762-4101 <072500<04.08.0504.08.05
Hardware TP600 0762-4102 <072500<04.08.0504.08.05
Hardware TP600 0762-4103 <062500<04.08.0504.08.05
Hardware TP600 0762-4201/8000-0001 <072500<04.08.0504.08.05
Remediation & Mitigation
0/3
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

HOTFIXUpdate Edge Controller 0752-8303/8000-0002 and all affected TP600 and CC100 models to firmware version 04.08.05 or later
HARDENINGIf upgrading firmware alone on older hardware revisions, verify that both hardware and firmware are updated together, as the advisory states older firmware versions will not resolve the problem on new hardware revisions
Long-term hardening
0/1
HARDENINGFor Hardware TP600 0762-4302/8000-0002 and Hardware TP600 0762-5204/8000-0001 with no fix available, plan replacement with newer hardware revisions or contact WAGO for alternative mitigation options
API: /api/v1/advisories/d0334c51-d182-4c72-93e9-939e8ba57df1

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.