CVE-2022-50926

9.8 CRITICAL

📋 TL;DR

This vulnerability in WAGO 750-8212 PFC200 G2 2ETH RS firmware allows attackers to escalate privileges by manipulating session cookies. Attackers can modify cookie parameters to gain administrative access without authentication. Organizations using affected WAGO programmable field controllers are at risk.

💻 Affected Systems

Products:
  • WAGO 750-8212 PFC200 G2 2ETH RS
Versions: Firmware versions prior to the patched version (specific version not provided in references)
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web interface of the programmable field controller. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of industrial control systems, allowing attackers to modify PLC logic, disrupt operations, or cause physical damage to connected equipment.

🟠

Likely Case

Unauthorized administrative access to controller configuration, enabling manipulation of industrial processes, data theft, or preparation for further attacks.

🟢

If Mitigated

Limited impact if controllers are isolated in segmented networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - If controllers are directly exposed to the internet, exploitation is trivial and could lead to immediate compromise.
🏢 Internal Only: MEDIUM - Requires network access but exploitation is simple once initial access is gained.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit requires only web access and cookie manipulation. Public exploit code exists on Exploit-DB.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check WAGO advisory for specific patched firmware version

Vendor Advisory: https://www.wago.com

Restart Required: Yes

Instructions:

1. Check current firmware version. 2. Download latest firmware from WAGO support portal. 3. Backup configuration. 4. Apply firmware update via web interface or SD card. 5. Verify update and restore configuration if needed.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate WAGO controllers in separate VLANs with strict firewall rules limiting access to authorized management stations only.

Disable Web Interface

all

Disable the web management interface if not required, using alternative configuration methods.

🧯 If You Can't Patch

  • Implement strict network access controls allowing only trusted IP addresses to access the controller web interface
  • Deploy web application firewall rules to detect and block cookie manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Access controller web interface, inspect session cookies for 'name' and 'roles' parameters that can be modified to gain admin access.

Check Version:

Check firmware version in web interface under System Information or via SSH if enabled

Verify Fix Applied:

After patching, attempt cookie manipulation exploit to confirm it no longer grants administrative privileges.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin access
  • Session cookie modifications in web server logs
  • Unusual administrative actions from non-admin users

Network Indicators:

  • HTTP requests with modified cookie parameters
  • Traffic to controller web interface from unexpected sources

SIEM Query:

source="web_logs" AND (cookie_modification OR roles="admin" AND user="non-admin")

🔗 References

📤 Share & Export