CVE-2021-21001

9.1 CRITICAL

📋 TL;DR

This vulnerability allows authenticated attackers with network access to WAGO PFC200 devices to access the file system with elevated privileges via specially crafted packets. It affects industrial control systems using these programmable field controllers. Attackers can potentially read, modify, or delete critical system files.

💻 Affected Systems

Products:
  • WAGO PFC200
Versions: Multiple firmware versions (specific versions detailed in VDE advisory)
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires network access to the device and authentication, but authentication can be via default credentials or weak configurations.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to modify firmware, steal credentials, disrupt industrial processes, or use the device as a pivot point into operational technology networks.

🟠

Likely Case

Unauthorized file system access leading to configuration theft, credential harvesting, or installation of persistent backdoors on affected devices.

🟢

If Mitigated

Limited impact if devices are properly segmented, monitored, and have strict access controls preventing unauthorized network connections.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication but could be combined with default credentials or credential harvesting. The path traversal vulnerability (CWE-22) suggests straightforward exploitation once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version 03.00.39(12) and later

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-014

Restart Required: Yes

Instructions:

1. Download latest firmware from WAGO support portal. 2. Backup device configuration. 3. Upload and install firmware update via web interface or WAGO Service Tool. 4. Verify installation and restore configuration if needed.

🔧 Temporary Workarounds

Network segmentation

all

Isolate PFC200 devices in dedicated VLANs with strict firewall rules limiting access to authorized management stations only.

Access control hardening

all

Change default credentials, implement strong authentication, and restrict administrative access to specific IP addresses.

🧯 If You Can't Patch

  • Implement strict network segmentation with firewall rules blocking all unnecessary traffic to affected devices
  • Enable detailed logging and monitoring for unauthorized access attempts and file system modifications

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Information) or using WAGO Service Tool. Compare against patched version 03.00.39(12).

Check Version:

No single command - check via web interface or WAGO Service Tool

Verify Fix Applied:

Verify firmware version shows 03.00.39(12) or later. Test file system access controls from authenticated sessions.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authentication attempts followed by successful login
  • Unusual file access patterns or modification timestamps
  • Administrative actions from unexpected IP addresses

Network Indicators:

  • Traffic to PFC200 devices from unauthorized networks
  • Unusual packet patterns or crafted requests to device services

SIEM Query:

source_ip IN (unauthorized_networks) AND dest_ip IN (pfc200_devices) AND (event_type="authentication" OR event_type="file_access")

🔗 References

📤 Share & Export