CVE-2015-6472
📋 TL;DR
This vulnerability in WAGO IO PLC devices involves weak credential management and privilege separation issues, allowing attackers to bypass authentication mechanisms. Affected systems include WAGO IO 750-849, 750-881, and 758-870 PLCs running specific firmware versions. This enables unauthorized access to industrial control systems.
💻 Affected Systems
- WAGO IO 750-849
- WAGO IO 750-881
- WAGO IO 758-870
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of industrial control systems leading to physical damage, production shutdown, or safety incidents through unauthorized PLC programming and control.
Likely Case
Unauthorized access to PLC configuration and logic, enabling manipulation of industrial processes, data theft, or denial of service.
If Mitigated
Limited impact if devices are isolated in segmented networks with strong access controls and monitoring.
🎯 Exploit Status
Public exploit details available in security advisories; authentication bypass makes exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check WAGO for updated firmware versions
Vendor Advisory: https://www.wago.com/global/industrial-automation/catalog/security-advisories
Restart Required: Yes
Instructions:
1. Contact WAGO support for latest firmware updates. 2. Backup PLC configuration. 3. Apply firmware update via programming software. 4. Restart PLC. 5. Verify functionality.
🔧 Temporary Workarounds
Network segmentation
allIsolate PLCs in dedicated industrial network segments with strict firewall rules
Access control hardening
allImplement strong authentication mechanisms and restrict network access to authorized IPs only
🧯 If You Can't Patch
- Implement network segmentation with industrial DMZ and strict firewall rules blocking all unnecessary ports
- Deploy intrusion detection systems monitoring for unauthorized PLC access attempts and configuration changes
🔍 How to Verify
Check if Vulnerable:
Check firmware version via WAGO programming software or web interface; compare against affected versions
Check Version:
Use WAGO e!COCKPIT or web interface to check firmware version
Verify Fix Applied:
Verify firmware version is updated beyond affected versions and test authentication mechanisms
📡 Detection & Monitoring
Log Indicators:
- Unauthorized authentication attempts
- PLC configuration changes from unexpected sources
- Failed login attempts followed by successful access
Network Indicators:
- Unexpected connections to PLC programming ports (TCP 1962, 2455)
- Traffic patterns indicating PLC reprogramming
SIEM Query:
source_ip=* AND (dest_port=1962 OR dest_port=2455) AND NOT source_ip IN [authorized_ips]
🔗 References
- http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html
- http://seclists.org/fulldisclosure/2016/Mar/4
- http://www.securityfocus.com/bid/84138
- http://packetstormsecurity.com/files/136077/WAGO-IO-PLC-758-870-750-849-Credential-Management-Privilege-Separation.html
- http://seclists.org/fulldisclosure/2016/Mar/4
- http://www.securityfocus.com/bid/84138