WAGO Advisory on Hard-Coded Credentials Hole

Tuesday, April 16, 2019 @ 05:04 PM gHale

WAGO released a security advisory on how to handle a use of hard-coded credentials vulnerability in its Series 750-88x and 750-87x, according to a report with NCCIC.

This vulnerability, discovered by Jörn Schneeweisz/Recurity Labs, allows a remote attacker to change the settings or alter the programming of the device.

RELATED STORIES
PLC Cycle Time Vulnerability with Multi Vendors
Siemens’ Updates SIMOCODE pro V EIP
Siemens Fixes Spectrum Power 4.7 Hole
Siemens Fixes SINEMA Remote Connect Holes

The following versions of Series 750-88x and 750-87x, programmable logic controllers suffer from the remotely exploitable vulnerability:

Series 750-88x
• 750-330 firmware versions prior to FW14
• 750-352 firmware versions prior to FW14
• 750-829 firmware versions prior to FW14
• 750-831 firmware versions prior to FW14
• 750-852 firmware versions prior to FW14
• 750-880 firmware versions prior to FW14
• 750-881 firmware versions prior to FW14
• 750-882 firmware versions prior to FW14
• 750-884 firmware versions prior to FW14
• 750-885 firmware versions prior to FW14
• 750-889 firmware versions prior to FW14

Series 750-87x
• 750-830 firmware versions prior to FW06
• 750-849 firmware versions prior to FW08
• 750-871 firmware versions prior to FW11
• 750-872 firmware versions prior to FW07
• 750-873 firmware versions prior to FW07

In the vulnerability, by exploiting the undocumented service access, it is possible to change the settings of a device and access web-based management with administrator privileges. An attacker can exploit this vulnerability to lock other users out from the device or open closed network ports. It is also possible to use this service access as an FTP user and exchange or delete the application.

CVE-2019-10712 is the case number assigned to this vulnerability, which has a CVSS v3 base score of 9.8.

The product sees use mainly in the commercial facilities, critical manufacturing, energy, and transportation Systems sectors. It also sees action on a global basis.

No known public exploits specifically target this vulnerability. However, an attacker with low skill level could leverage the vulnerability.

WAGO released a security advisory on the vulnerability.

WAGO recommends updating to the newest firmware as listed above and taking the following defensive measures:
• Restrict network access to the web server
• Restrict network access to the device
• Do not directly connect the device to the Internet

CERT@VDE published an advisory regarding this vulnerability.



Leave a Reply

You must be logged in to post a comment.