CVE-2025-41672

10.0 CRITICAL

📋 TL;DR

This critical vulnerability allows remote unauthenticated attackers to generate valid JWT tokens using default certificates, granting them full administrative access to affected systems and all connected devices. Any organization using vulnerable versions of the affected products with default configurations is at risk.

💻 Affected Systems

Products:
  • WAGO PFC200
  • WAGO PFC100
Versions: All versions before firmware 03.10.00(24)
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Systems using default certificates are vulnerable. Custom certificate deployments may reduce risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to control all connected devices, steal sensitive data, deploy ransomware, or disrupt critical operations.

🟠

Likely Case

Unauthorized administrative access leading to data exfiltration, lateral movement to connected devices, and potential persistence in the network.

🟢

If Mitigated

Limited impact if proper network segmentation, certificate rotation, and access controls are implemented before exploitation.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing instances immediate targets.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to network-accessible attackers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CVSS 10.0 indicates trivial exploitation with maximum impact. No public PoC confirmed but weaponization is likely given the severity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware 03.10.00(24) or later

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2025-057

Restart Required: Yes

Instructions:

1. Download firmware 03.10.00(24) or later from WAGO support portal. 2. Backup current configuration. 3. Upload and install new firmware via web interface or WAGO Service Tool. 4. Restart device. 5. Verify firmware version and regenerate certificates.

🔧 Temporary Workarounds

Network Isolation

all

Isolate affected devices from untrusted networks and internet access

Configure firewall rules to restrict access to trusted IPs only

Certificate Replacement

all

Replace default certificates with organization-specific certificates

Use WAGO Service Tool to generate and deploy custom certificates

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to trusted management networks only
  • Deploy network monitoring and IDS/IPS to detect and block JWT token manipulation attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (System > Information) or using WAGO Service Tool. Versions before 03.10.00(24) are vulnerable.

Check Version:

curl -k https://<device-ip>/api/system/info | grep version

Verify Fix Applied:

Confirm firmware version is 03.10.00(24) or later and verify certificates have been regenerated post-update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JWT token generation events
  • Authentication attempts from unexpected IPs
  • Administrative actions from unverified sources

Network Indicators:

  • JWT token requests to default certificate endpoints
  • Unauthorized API calls to device management interfaces

SIEM Query:

source="wago-device" AND (event_type="jwt_generation" OR auth_method="certificate") AND result="success"

🔗 References

📤 Share & Export