CVE-2020-12516

7.5 HIGH

📋 TL;DR

This vulnerability affects older firmware versions of WAGO PLC family 750-88x and 750-352 devices, allowing a special denial of service attack that can disrupt industrial control operations. Organizations using these specific programmable logic controllers with vulnerable firmware are at risk of operational disruption.

💻 Affected Systems

Products:
  • WAGO PLC 750-88x series
  • WAGO PLC 750-352
Versions: Firmware versions FW1 through FW10
Operating Systems: Embedded PLC firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific WAGO PLC models with vulnerable firmware versions; newer firmware versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disruption of industrial processes controlled by the PLC, potentially causing production downtime, safety system failures, or equipment damage in critical infrastructure environments.

🟠

Likely Case

Temporary unavailability of the PLC requiring manual reboot, causing production interruptions and requiring operator intervention to restore normal operations.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring, allowing quick detection and isolation of attack traffic before service disruption occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The advisory describes a 'special denial of service attack' but does not provide technical details about the exploit mechanism.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware versions after FW10

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2020-042

Restart Required: Yes

Instructions:

1. Download latest firmware from WAGO support portal. 2. Backup PLC configuration. 3. Upload new firmware via programming software. 4. Restore configuration. 5. Verify operation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PLCs in dedicated industrial network segments with strict firewall rules to limit access.

Access Control Lists

all

Implement network ACLs to restrict traffic to PLCs from authorized sources only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate PLCs from untrusted networks
  • Deploy industrial intrusion detection systems to monitor for DoS attack patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via WAGO programming software or web interface; versions FW1-FW10 are vulnerable.

Check Version:

Use WAGO e!COCKPIT or web interface to check firmware version

Verify Fix Applied:

Confirm firmware version is above FW10 using WAGO programming software or device interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual traffic patterns to PLC ports
  • PLC reboot events
  • Connection attempts from unauthorized sources

Network Indicators:

  • High volume of traffic to PLC management ports
  • Unusual protocol patterns targeting PLCs

SIEM Query:

source_ip=* AND dest_ip=PLC_IP AND (port=502 OR port=80 OR port=443) AND bytes_sent>threshold

🔗 References

📤 Share & Export