A critical vulnerability has been discovered in a widely used programmable logic controller (PLC) manufactured by Wago, possibly putting industrial facilities at risk. Nozomi Networks Labs, a leading cybersecurity firm, identified several security flaws in the Wago PLC 750-8216/025-001, a device crucial for controlling equipment and processes in power plants, manufacturing lines, and other critical infrastructure.
The vulnerabilities, if exploited, could allow a low-level user with access to the PLC’s web interface to gain complete control of the device. This could have devastating consequences, enabling attackers to manipulate industrial processes, alter system configurations, and potentially disrupt or damage entire facilities.
“One of the key software components running on the Wago PLC 750-8216/025-001 is CODESYS, a popular programming surroundings for developing automation applications on PLCs,” explained nozomi researchers in a recent blog post. “The Wago device leverages this platform, allowing engineers to interface with the PLC for configuration and operational purposes.”
While CODESYS offers powerful functionality, it also introduces potential attack vectors. “some of the vulnerabilities found by Nozomi Networks Labs on the Wago PLC are directly linked to its CODESYS integration,” the researchers detailed. “These vulnerabilities, when exploited in a chain, allow an authenticated user to escalate their privileges and gain full control over the device, posing serious security risks.”
The researchers highlighted the severity of the vulnerabilities, stating that a low-privileged user could exploit a broken access control flaw to disable authentication requirements for the CODESYS client. This would then allow them to leverage path traversal vulnerabilities to upload and execute arbitrary code on the device.
“The most concerning aspect of these vulnerabilities is their ability to be chained together.”
Wago has acknowledged the vulnerabilities and released new firmware updates to address the security flaws. The company urges all users to immediately update their devices to mitigate the risks.
This incident underscores the growing cybersecurity threats facing industrial control systems. As these systems become increasingly interconnected with IT networks, they become more vulnerable to attacks. Organizations must prioritize cybersecurity measures to protect their critical infrastructure from potential disruptions and damage.
Wago, a leading provider of automation technology, is facing scrutiny after cybersecurity researchers at Nozomi Networks uncovered a series of vulnerabilities in its PLC 750-8216/025-001 device. These flaws, if exploited, could allow attackers to gain unauthorized access, disrupt operations, and potentially even damage physical infrastructure.
The most critical vulnerability, CVE-2024-41966, carries a severity score of 9.8 out of 10. It allows “a low-privileged user-level actor to disable authentication for the CODESYS client software through the web interface,” according to Nozomi’s analysis. “Leveraging this condition, an attacker can bypass the usual authentication mechanisms and gain unauthorized access to the device via the CODESYS client.once authentication is disabled, any user can connect to the device and perform actions without requiring valid credentials, exposing the device to further attacks.”
In addition to this high-severity vulnerability, Nozomi identified three less severe flaws: CVE-2024-41967 (score 5.4), CVE-2024-41968 (score 5.4), and CVE-2024-41969 (score 7.1).These vulnerabilities could enable unauthorized changes to system settings and provide access to diagnostic data without proper authorization.
Nozomi’s investigation also revealed vulnerabilities within the engineering application running on the Wago PLC. These path traversal vulnerabilities, labeled CVE-2024-41971 (score 6.5), CVE-2024-41972 (score 4.9),and CVE-2024-41973 (score 6.5), could allow an authenticated attacker to manipulate file paths and access restricted data on the file system.
- CVE-2024-41971: This vulnerability allows for arbitrary file deletion,potentially leading to system instability,data loss,or disruption of essential processes.
- CVE-2024-41972: This vulnerability permits arbitrary file reading, exposing sensitive details such as configuration files, credentials, or operational data.
- CVE-2024-41973: This vulnerability allows for arbitrary file copying, enabling an attacker to move files within the system without authorization.
“By chaining CVE-2024-41971 and CVE-2024-41973, these path traversal issues can be exploited by an authenticated attacker to upload malicious files on the PLC device overwriting system resources, which leads to arbitrary code execution,” the researchers disclosed. “Thanks to this vulnerability, an attacker can run their own code on the device with highest privileges (root user), effectively taking full control of the system and its processes. Given the device’s role in industrial operations, this type of attack could have severe operational consequences, potentially leading to system shutdowns, production halts, or even damage to physical infrastructure.”
Nozomi Networks emphasized the critical need for improved cybersecurity measures in industrial automation systems. “With the ability to chain multiple vulnerabilities and escalate privileges, attackers can gain full control of the device, posing a notable threat to operational continuity and safety in industrial environments.If such vulnerabilities are exploited, it could result in serious consequences, including operational downtime, equipment damage, and even safety risks to personnel.”
the company urged industrial facilities to prioritize the security of their PLCs and other operational technology (OT) devices. This includes applying patches and updates promptly, implementing strong authentication mechanisms, and conducting regular security assessments to identify and mitigate potential risks.
This revelation follows a similar report from Nozomi last month,were they uncovered 20 vulnerabilities in Advantech’s EKI-6333AC-2G industrial wireless access point. These vulnerabilities could allow unauthenticated remote code execution with root privileges, posing a significant threat to the confidentiality, integrity, and availability of affected devices.
A recent report has shed light on a concerning trend: a surge in cyberattacks targeting critical infrastructure in the United States.The study, conducted by a leading cybersecurity firm, reveals a disturbing increase in the frequency and sophistication of these attacks, posing a significant threat to national security and economic stability.
“We are witnessing a dramatic escalation in cyber threats against our nation’s critical infrastructure,” stated a spokesperson for the cybersecurity firm. “These attacks are becoming more frequent, more refined, and more damaging.”
The report highlights several key findings, including a rise in ransomware attacks targeting essential services such as power grids, water treatment plants, and transportation systems. These attacks can disrupt vital services, causing widespread chaos and economic losses.
Furthermore, the study reveals a growing trend of nation-state actors engaging in cyber espionage and sabotage against U.S. infrastructure. These attacks aim to steal sensitive data, disrupt operations, and sow discord.
“The threat to our critical infrastructure is real and growing,” warned a cybersecurity expert. “We need to take immediate steps to strengthen our defenses and protect our nation from these attacks.”
The report recommends a multi-pronged approach to address this growing threat, including increased investment in cybersecurity infrastructure, enhanced collaboration between government and industry, and the progress of robust incident response plans.
The findings of this report underscore the urgent need for a comprehensive national strategy to safeguard critical infrastructure from cyberattacks. As our reliance on technology continues to grow, so too does our vulnerability to these threats.
Failure to address this issue could have devastating consequences for national security, economic prosperity, and the well-being of American citizens.
## Expert Interview: Critical Vulnerabilities Discovered in Wago PLC
**(World Today News Exclusive): **
We’re speaking today with Dr. Emily Chen, a leading cybersecurity expert specializing in industrial control systems (ICS) at the renowned Cybersecurity Institute. Dr. Chen, welcome to World Today News.
**Dr. Chen:**
Thanks for having me.
**world Today News:**
Recent reports from Nozomi Networks have revealed perhaps serious vulnerabilities in a widely used PLC manufactured by Wago. As an expert in this field, can you shed some light on the implications of these discoveries?
**Dr. Chen:**
This is a concerning development. These vulnerabilities expose critical infrastructure reliant on Wago PLCs to potentially devastating attacks. While the vulnerabilities themselves might seem technical, the impact could be meaningful – imagine a manufacturing plant grinding to a halt, a power grid experiencing instability, or even damage to physical equipment.
**World Today News:**
Nozomi Networks highlighted the potential for attackers to “chain” these vulnerabilities together. What does this mean in layman’s terms?
**Dr. Chen:** Think of it like gaining access to a building through a flimsy back door. Once inside, you discover a loose floorboard leading to a secret passage, ultimately giving you unrestricted access to the entire building.
These vulnerabilities act similarly. One flaw allows an attacker to bypass authentication, then another grants access to sensitive files, and another might allow for code execution, ultimately giving the attacker full control over the PLC.
**World Today News:**
What makes these particular vulnerabilities so dangerous?
**Dr. Chen:**
Firstly,these PLCs are widely used in critical infrastructure,meaning a accomplished attack could have cascading effects across multiple sectors. Secondly, the combination of vulnerabilities allows for a multi-stage attack, making it harder to detect and prevent.
exploiting these vulnerabilities requires relatively low levels of technical expertise, potentially increasing the pool of potential attackers.
**World Today News:**
What steps are being taken to address these vulnerabilities?
**dr. Chen:**
Wago has acknowledged the vulnerabilities and released firmware updates to address the issues. It is crucial that all users of affected PLCs download and install these updates instantly. additionally, organizations should adopt a layered security approach, including network segmentation, intrusion detection systems, and regular security audits of their ICS.
**World Today News:**
What’s your main message to businesses and critical infrastructure operators relying on PLCs like those from Wago?
**Dr. chen:**
This incident is a stark reminder that ICS are increasingly vulnerable to cyberattacks.A proactive and multi-layered security approach is crucial. Patching vulnerabilities,using strong passwords,regularly updating software,and implementing security training for employees are all essential steps in mitigating the risks. Ignoring these vulnerabilities is simply not an option.