Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Vulnerabilities Found in WAGO Industrial Switches

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

The flaws impact WAGO 852-303, 852-1305 and 852-1505 switches. WAGO, a Germany-based industrial automation solutions provider, has addressed the security holes with the release of firmware versions 1.2.2.S0, 1.1.6.S0 and 1.1.5.S0, respectively.

One of the most serious of the vulnerabilities involves the presence of hardcoded credentials (CVE-2019-12550). A default account with root privileges has what SEC Consult has described as a “really weak password.” The credentials are stored in a file and they allow an attacker to connect to vulnerable WAGO switches via Telnet or SSH.WAGO industrial switch

Another critical issue is related to hardcoded private keys for the SSH daemon. The private key is embedded in the device’s firmware and it can be abused to perform man-in-the-middle (MitM) attacks against the Dropbear SSH daemon without the victim noticing any fingerprint changes, Johannes Greil, head of the SEC Consult Vulnerability Lab, told SecurityWeek.

SEC Consult also found that the affected WAGO industrial switches use outdated versions of the BusyBox UNIX toolkit and the GNU C Library (glibc) that are known to contain vulnerabilities, including critical weaknesses. Greil has pointed out that the use of outdated components is a “big industry issue.”

Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference

Fortunately, Greil told SecurityWeek, the impacted switches don’t appear to be reachable directly from the Internet. The company’s IoT Inspector platform showed no SSH fingerprints and no SSL certificates associated with these devices via the Shodan and Censys search engines.

Advertisement. Scroll to continue reading.

Germany’s VDE CERT, which coordinated the disclosure of the vulnerabilities, has published an advisory of its own and WAGO is expected to do the same soon.

Related: Network DoS Attack on PLCs Can Disrupt Physical Processes

Related: Critical Flaw in WAGO PLC Exposes Organizations to Attacks

Related: Hackers Can Chain Multiple Flaws to Attack WAGO HMI Devices

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Tim Byrd has been appointed Chief Information Security Officer at First Citizens Bank.

IRONSCALES has named Steve McKenzie as Chief Operating Officer.

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.