Now on Demand: Zero Trust Strategies Summit - Access All Sessions
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

ICS/OT

Critical Vulnerabilities Found in WAGO Industrial Switches

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

A researcher at security services and consulting company SEC Consult discovered that some industrial managed switches made by WAGO are affected by several serious vulnerabilities.

The flaws impact WAGO 852-303, 852-1305 and 852-1505 switches. WAGO, a Germany-based industrial automation solutions provider, has addressed the security holes with the release of firmware versions 1.2.2.S0, 1.1.6.S0 and 1.1.5.S0, respectively.

One of the most serious of the vulnerabilities involves the presence of hardcoded credentials (CVE-2019-12550). A default account with root privileges has what SEC Consult has described as a “really weak password.” The credentials are stored in a file and they allow an attacker to connect to vulnerable WAGO switches via Telnet or SSH.WAGO industrial switch

Another critical issue is related to hardcoded private keys for the SSH daemon. The private key is embedded in the device’s firmware and it can be abused to perform man-in-the-middle (MitM) attacks against the Dropbear SSH daemon without the victim noticing any fingerprint changes, Johannes Greil, head of the SEC Consult Vulnerability Lab, told SecurityWeek.

SEC Consult also found that the affected WAGO industrial switches use outdated versions of the BusyBox UNIX toolkit and the GNU C Library (glibc) that are known to contain vulnerabilities, including critical weaknesses. Greil has pointed out that the use of outdated components is a “big industry issue.”

Learn More About Flaws in Industrial Products at SecurityWeek’s 2019 ICS Cyber Security Conference

Fortunately, Greil told SecurityWeek, the impacted switches don’t appear to be reachable directly from the Internet. The company’s IoT Inspector platform showed no SSH fingerprints and no SSL certificates associated with these devices via the Shodan and Censys search engines.

Germany’s VDE CERT, which coordinated the disclosure of the vulnerabilities, has published an advisory of its own and WAGO is expected to do the same soon.

Related: Network DoS Attack on PLCs Can Disrupt Physical Processes

Advertisement. Scroll to continue reading.

Related: Critical Flaw in WAGO PLC Exposes Organizations to Attacks

Related: Hackers Can Chain Multiple Flaws to Attack WAGO HMI Devices

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join SecurityWeek and Hitachi Vantara for this this webinar to gain valuable insights and actionable steps to enhance your organization's data security and resilience.

Register

Event: ICS Cybersecurity Conference

The leading industrial cybersecurity conference for Operations, Control Systems and IT/OT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity.

Register

People on the Move

Former Darktrace CEO Poppy Gustafsson has joined the UK government as Minister for Investment.

Nupur Goyal has joined cloud identity security and management solutions provider Saviynt as VP of Product Marketing.

Threat intelligence firm Intel 471 has appointed Mark Huebeler as its COO and CFO.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.