CVE-2020-12506

WAGO: Authentication Bypass Vulnerability in WAGO 750-36X and WAGO 750-8XX Versions <= FW03

Description

Improper Authentication vulnerability in WAGO 750-8XX series with FW version <= FW03 allows an attacker to change the settings of the devices by sending specifically constructed requests without authentication This issue affects: WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx in versions FW03 and prior versions.

Remediation

Solution:

  • Upgrade devices to the latest standard firmware (> FW03).

Workaround:

  • Restrict network access to the device. Do not directly connect the device to the internet. Disable unused TCP/UDP ports. Disable web-based management ports 80/443 after the configuration phase

Category

9.1
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.32%
Third-Party Advisory vde.com
Affected: WAGO 750-362
Affected: WAGO 750-363
Affected: WAGO 750-823
Affected: WAGO 750-832/xxx-xxx
Affected: WAGO 750-862
Affected: WAGO 750-891
Affected: WAGO 750-890/xxx-xxx
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2020-12506?
CVE-2020-12506 has been scored as a critical severity vulnerability.
How to fix CVE-2020-12506?
To fix CVE-2020-12506: Upgrade devices to the latest standard firmware (> FW03).
Is CVE-2020-12506 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2020-12506 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2020-12506?
CVE-2020-12506 affects WAGO 750-362, WAGO 750-363, WAGO 750-823, WAGO 750-832/xxx-xxx, WAGO 750-862, WAGO 750-891, WAGO 750-890/xxx-xxx.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.