CVE-2021-20994

8.8 HIGH

📋 TL;DR

This is a cross-site scripting (XSS) vulnerability in WAGO managed switches that allows attackers to inject malicious code into the web-based management interface. Attackers can trick legitimate users into clicking specially crafted links, potentially compromising switch management sessions. Organizations using affected WAGO managed switches are vulnerable.

💻 Affected Systems

Products:
  • WAGO managed switches
Versions: Multiple versions (specific versions not detailed in provided references)
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects web-based management interface of WAGO industrial switches. Exact model numbers and firmware versions should be verified with vendor advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of switch management, allowing attacker to reconfigure network settings, intercept traffic, or use the switch as a pivot point to attack other network devices.

🟠

Likely Case

Session hijacking of administrative users, credential theft, or unauthorized configuration changes to the switch.

🟢

If Mitigated

Limited impact if proper network segmentation, web application firewalls, and user awareness training are implemented.

🌐 Internet-Facing: HIGH if web management interface is exposed to internet, as attackers can craft malicious links targeting administrators.
🏢 Internal Only: MEDIUM as attackers would need internal network access or to trick internal users, but impact remains significant for network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires social engineering to trick authenticated users into clicking malicious links. XSS vulnerabilities are commonly weaponized in real-world attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-013

Restart Required: Yes

Instructions:

1. Check VDE advisory for affected models and versions. 2. Download firmware updates from WAGO support portal. 3. Backup current configuration. 4. Apply firmware update following vendor instructions. 5. Verify update applied successfully.

🔧 Temporary Workarounds

Restrict Web Interface Access

all

Limit access to switch web management interface to trusted IP addresses only

Configure firewall rules to restrict access to switch management IP/ports

Implement Web Application Firewall

all

Deploy WAF to filter malicious XSS payloads

Configure WAF rules to block XSS patterns in HTTP requests

🧯 If You Can't Patch

  • Segment switch management network from general user networks
  • Implement strict user awareness training about clicking unknown links

🔍 How to Verify

Check if Vulnerable:

Check switch firmware version against vendor advisory. Test web interface for XSS vulnerabilities using safe testing methods.

Check Version:

Check web interface system information page or use SNMP to query firmware version

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory. Test that XSS payloads no longer execute in web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual web interface access patterns
  • Multiple failed login attempts followed by successful login
  • Configuration changes from unexpected sources

Network Indicators:

  • HTTP requests containing XSS patterns to switch management interface
  • Unusual outbound connections from switch

SIEM Query:

source_ip="switch_management_ip" AND (http_uri CONTAINS "<script>" OR http_uri CONTAINS "javascript:")

🔗 References

📤 Share & Export