Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2020-12522
PUBLISHED
More InfoOfficial Page
Assigner-CERTVDE
Assigner Org ID-270ccfa6-a436-4e77-922e-914ec3a9685c
View Known Exploited Vulnerability (KEV) details
Published At-17 Dec, 2020 | 22:40
Updated At-16 Sep, 2024 | 18:14
Rejected At-
▼CVE Numbering Authority (CNA)
Command Injection Vulnerability in I/O-Check Service of WAGO PFC100, PFC200 and Touch Panel 600 Series with firmware versions <=FW10

The reported vulnerability allows an attacker who has network access to the device to execute code with specially crafted packets in WAGO Series PFC 100 (750-81xx/xxx-xxx), Series PFC 200 (750-82xx/xxx-xxx), Series Wago Touch Panel 600 Standard Line (762-4xxx), Series Wago Touch Panel 600 Advanced Line (762-5xxx), Series Wago Touch Panel 600 Marine Line (762-6xxx) with firmware versions <=FW10.

Affected Products
Vendor
WAGO
Product
Series PFC 100 (750-81xx/xxx-xxx)
Versions
Affected
  • From FW1 through FW10 (custom)
Vendor
WAGO
Product
Series PFC 200 (750-82xx/xxx-xxx)
Versions
Affected
  • From FW1 through FW10 (custom)
Vendor
WAGO
Product
Series Wago Touch Panel 600 Standard Line (762-4xxx)
Versions
Affected
  • From FW1 through FW10 (custom)
Vendor
WAGO
Product
Series Wago Touch Panel 600 Advanced Line (762-5xxx)
Versions
Affected
  • From FW1 through FW10 (custom)
Vendor
WAGO
Product
Series Wago Touch Panel 600 Marine Line (762-6xxx)
Versions
Affected
  • From FW1 through FW10 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-78CWE-78 OS Command Injection
Metrics
VersionBase scoreBase severityVector
3.110.0CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

The I/O-Check service protocol is only needed during installation and commissioning, not during normal operations. It is highly recommended to disable the I/O-Check service after commissioning. This is the easiest and securest way to protect your device from the listed vulnerabilities. Regardless to the action described above, the vulnerability has been fixed in FW11, released in December 2017.

Configurations

Workarounds

Disable I/O-Check service Restrict network access to the device. Do not directly connect the device to the internet.

Exploits

Credits

This vulnerability was originally found by Florian Seidel of WAGO and was rediscovered by Uri Katz of Claroty. We thank CERT@VDE for the management of this coordinated disclosure.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories/vde-2020-045
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://cert.vde.com/en-us/advisories/vde-2020-045
x_refsource_CONFIRM
x_transferred
Details not found