Wago 750 Series PLCs with firmware version 10 and prior include a remote attack may take advantage of an improper implementation of the 3 way handshake during a TCP connection affecting the communications with commission and service tools. Specially crafted packets may also be sent to Port 2455/TCP/IP, used in Codesys management software, which may result in a denial-of-service condition of communications with commissioning and service tools.
[
{
"product": "WAGO 750 Series",
"vendor": "WAGO",
"versions": [
{
"status": "affected",
"version": "750-880 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-881 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-852 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-882 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-885 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-831 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-889 firmware version 10 and prior"
},
{
"status": "affected",
"version": "750-829 firmware version 10 and prior"
}
]
}
]
www.securityfocus.com/bid/103726
ics-cert.us-cert.gov/advisories/ICSA-18-088-01
www.wago.com/medias/Vulnerability-in-the-WAGO-Ethernet-TCP-IP-driver.pdf?context=bWFzdGVyfHJvb3R8MjgxNDk0fGFwcGxpY2F0aW9uL3BkZnxoOTcvaDhkLzkxNTAyMjMyMjA3NjYucGRmfGRlNWQ4ODc0NTE5M2UyNTUwNTIyNDRlOWFkNWI2YjNkMzg0YTVhYzlmYTBjNzM4MDdmNmYzOTM5M2ZlMGEzNzE