In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-8403 In multiple managed switches by WAGO in different versions an attacker may trick a legitimate user to click a link to inject possible malicious code into the Web-Based Management.
Fixes

Solution

The Web-Based Management is only needed during installation and commissioning, not during normal operations. It is recommended to disable the web server after commissioning. The Command Line Interface (CLI) is an alternative for commissioning the device. This is the easiest and securest way to protect your device from the listed vulnerabilities. Regardless of the action described above, the vulnerabilities are fixed with following firmware releases: Item number [FW version] 0852-0303 (HW < 3)* [V1.2.5.S0] Detailed information about the hardware version is described in the installation guide. 0852-0303 (HW >=3)* [V1.2.3.S1] Detailed information about the hardware version is described in the installation guide. 0852-1305 [V1.1.8.S0] 0852-1505 [V1.1.7.S0] 0852-1305/000-001 [V1.1.4.S0] 0852-1505/000-001 [V1.1.4.S0]


Workaround

Disable the web server of the device. Use the CLI interface of the device. Update to the latest firmware. Restrict network access to the device. Do not directly connect the device to the internet.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T01:16:25.472Z

Reserved: 2020-12-17T00:00:00

Link: CVE-2021-20994

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-05-13T14:15:17.970

Modified: 2024-11-21T05:47:21.880

Link: CVE-2021-20994

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.