CVE-2023-1698
📋 TL;DR
This critical vulnerability in WAGO products allows unauthenticated remote attackers to create new user accounts and modify device configurations. This can lead to denial of service, system compromise, and unauthorized control of affected devices. Organizations using vulnerable WAGO industrial control systems are affected.
💻 Affected Systems
- WAGO PFC100
- WAGO PFC200
- WAGO Touch Panel 600
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to take complete control of industrial devices, disrupt operations, manipulate processes, and potentially cause physical damage or safety incidents.
Likely Case
Unauthorized configuration changes leading to service disruption, data manipulation, and creation of persistent backdoor accounts for future attacks.
If Mitigated
Limited impact with proper network segmentation and access controls preventing external attackers from reaching vulnerable interfaces.
🎯 Exploit Status
The vulnerability requires no authentication and minimal technical skill to exploit, making it highly attractive to attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific firmware versions
Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2023-007/
Restart Required: Yes
Instructions:
1. Identify affected WAGO devices. 2. Download latest firmware from WAGO support portal. 3. Backup current configuration. 4. Apply firmware update following vendor instructions. 5. Verify update success and restore configuration if needed.
🔧 Temporary Workarounds
Network Segmentation
allIsolate WAGO devices from untrusted networks and restrict access to management interfaces
Access Control Lists
linuxImplement firewall rules to restrict access to WAGO device management ports
iptables -A INPUT -p tcp --dport [WAGO_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [WAGO_PORT] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable devices from untrusted networks
- Deploy intrusion detection systems to monitor for exploitation attempts and configuration changes
🔍 How to Verify
Check if Vulnerable:
Check device firmware version against vendor advisory. Attempt to access management interface without authentication to test for vulnerability.
Check Version:
Check via WAGO web interface or use vendor-specific CLI commands for firmware version
Verify Fix Applied:
Verify firmware version matches patched version from vendor advisory. Test that unauthenticated access to user creation and configuration functions is blocked.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated access attempts to administrative interfaces
- Unexpected user account creation
- Configuration changes from unknown sources
Network Indicators:
- Unusual traffic patterns to WAGO management ports
- Multiple failed authentication attempts followed by successful access
SIEM Query:
source="WAGO_DEVICE" AND (event_type="user_creation" OR event_type="config_change") AND user="unknown"