A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.
The flaws impact WAGO 852-303, 852-1305 and 852-1505 switches. WAGO, a Germany-based industrial automation solutions provider, has addressed the security holes with the release of firmware versions 1.2.2.S0, 1.1.6.S0 and 1.1.5.S0, respectively.
One of the most serious of the vulnerabilities involves the presence of hardcoded credentials (CVE-2019-12550). A default account with root privileges has what SEC Consult has described as a “really weak password.” The credentials are stored in a file and they allow an attacker to connect to vulnerable WAGO switches via Telnet or SSH.
Another critical issue is related to hardcoded private keys for the SSH daemon. The private key is embedded in the device’s firmware and it can be abused to perform man-in-the-middle (MitM) attacks against the Dropbear SSH daemon without the victim noticing any fingerprint changes, Johannes Greil, head of the SEC Consult Vulnerability Lab, told SecurityWeek.
SEC Consult also found that the affected WAGO industrial switches use outdated versions of the BusyBox UNIX toolkit and the GNU C Library (glibc) that are known to contain vulnerabilities, including critical weaknesses. Greil has pointed out that the use of outdated components is a “big industry issue.”
Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference
Fortunately, Greil told SecurityWeek, the impacted switches don’t appear to be reachable directly from the Internet. The company’s IoT Inspector platform showed no SSH fingerprints and no SSL certificates associated with these devices via the Shodan and Censys search engines.
Germany’s VDE CERT, which coordinated the disclosure of the vulnerabilities, has published an advisory of its own and WAGO is expected to do the same soon.
Related: Network DoS Attack on PLCs Can Disrupt Physical Processes
Related: Critical Flaw in WAGO PLC Exposes Organizations to Attacks
Related: Hackers Can Chain Multiple Flaws to Attack WAGO HMI Devices

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- Organizations Notified of Remotely Exploitable Vulnerabilities in Aveva HMI, SCADA Products
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
Latest News
- Google Suspends Chinese Shopping App Amid Security Concerns
- Verosint Launches Account Fraud Detection and Prevention Platform
- Ransomware Gang Publishes Data Allegedly Stolen From Maritime Firm Royal Dirkzwager
- Zoom Paid Out $3.9 Million in Bug Bounties in 2022
- Oleria Scores $8M Seed Funding for ID Authentication Technology
- Exploitation of 55 Zero-Day Vulnerabilities Came to Light in 2022: Mandiant
- News Analysis: UK Commits $3 Billion to Support National Quantum Strategy
- Malicious NuGet Packages Used to Target .NET Developers
