Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Vulnerabilities Found in WAGO Industrial Switches

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

The flaws impact WAGO 852-303, 852-1305 and 852-1505 switches. WAGO, a Germany-based industrial automation solutions provider, has addressed the security holes with the release of firmware versions 1.2.2.S0, 1.1.6.S0 and 1.1.5.S0, respectively.

One of the most serious of the vulnerabilities involves the presence of hardcoded credentials (CVE-2019-12550). A default account with root privileges has what SEC Consult has described as a “really weak password.” The credentials are stored in a file and they allow an attacker to connect to vulnerable WAGO switches via Telnet or SSH.WAGO industrial switch

Another critical issue is related to hardcoded private keys for the SSH daemon. The private key is embedded in the device’s firmware and it can be abused to perform man-in-the-middle (MitM) attacks against the Dropbear SSH daemon without the victim noticing any fingerprint changes, Johannes Greil, head of the SEC Consult Vulnerability Lab, told SecurityWeek.

SEC Consult also found that the affected WAGO industrial switches use outdated versions of the BusyBox UNIX toolkit and the GNU C Library (glibc) that are known to contain vulnerabilities, including critical weaknesses. Greil has pointed out that the use of outdated components is a “big industry issue.”

Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference

Fortunately, Greil told SecurityWeek, the impacted switches don’t appear to be reachable directly from the Internet. The company’s IoT Inspector platform showed no SSH fingerprints and no SSL certificates associated with these devices via the Shodan and Censys search engines.

Germany’s VDE CERT, which coordinated the disclosure of the vulnerabilities, has published an advisory of its own and WAGO is expected to do the same soon.

Related: Network DoS Attack on PLCs Can Disrupt Physical Processes

Related: Critical Flaw in WAGO PLC Exposes Organizations to Attacks

Related: Hackers Can Chain Multiple Flaws to Attack WAGO HMI Devices

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

CISO Strategy

Cybersecurity-related risk is a top concern, so boards need to know they have the proper oversight in place. Even as first-timers, successful CISOs make...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

ICS/OT

Otorio has released a free tool that organizations can use to detect and address issues related to DCOM authentication.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.