CVE-2021-20998

10.0 CRITICAL

📋 TL;DR

This critical vulnerability in WAGO managed switches allows unauthenticated attackers to create new user accounts via specially crafted network packets. This affects multiple WAGO switch models running vulnerable firmware versions, potentially giving attackers administrative access to industrial network infrastructure.

💻 Affected Systems

Products:
  • WAGO managed switches (multiple models)
Versions: Multiple versions prior to patched firmware
Operating Systems: Embedded switch firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects switches with default configurations; no special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative control of industrial switches, enabling network disruption, data exfiltration, or lateral movement into critical operational technology networks.

🟠

Likely Case

Unauthorized users gain administrative access to switches, allowing configuration changes, network monitoring, or denial of service attacks.

🟢

If Mitigated

If switches are isolated from untrusted networks and have proper access controls, impact is limited to authorized network segments only.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers on the internet to compromise exposed devices.
🏢 Internal Only: HIGH - Even internally, any attacker on the network can exploit this without credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated remote code execution with specially crafted packets; exploit development is straightforward given the vulnerability details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check specific firmware updates for each switch model

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-013

Restart Required: Yes

Instructions:

1. Identify affected WAGO switch models. 2. Download latest firmware from WAGO support portal. 3. Backup current configuration. 4. Apply firmware update via management interface. 5. Verify update and restore configuration if needed.

🔧 Temporary Workarounds

Network segmentation

all

Isolate WAGO switches from untrusted networks and restrict management interface access

Access control lists

all

Implement strict network ACLs to limit traffic to switch management interfaces

🧯 If You Can't Patch

  • Segment switches into isolated VLANs with strict firewall rules
  • Disable remote management interfaces if not required

🔍 How to Verify

Check if Vulnerable:

Check switch firmware version against WAGO advisory; if running vulnerable version and exposed to network traffic, device is vulnerable.

Check Version:

Check via switch web interface or CLI: 'show version' or equivalent

Verify Fix Applied:

Verify firmware version is updated to patched version listed in WAGO advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user account creation
  • Authentication attempts from unknown IPs
  • Configuration changes without authorization

Network Indicators:

  • Unusual traffic to switch management ports (TCP/80, TCP/443, TCP/22)
  • Suspicious packets to switch management interfaces

SIEM Query:

source_ip=* AND (dest_port=80 OR dest_port=443 OR dest_port=22) AND dest_ip=[switch_ip] AND event_type=authentication_failure

🔗 References

📤 Share & Export