Skip to main content

CVE-2025-1235: CWE-190 Integer Overflow or Wraparound in WAGO Fully Managed Switches 0852-0303

Medium
VulnerabilityCVE-2025-1235cvecve-2025-1235cwe-190
Published: Mon Jun 02 2025 (06/02/2025, 06:23:19 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: Fully Managed Switches 0852-0303

Description

A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970.

AI-Powered Analysis

AILast updated: 07/09/2025, 12:25:09 UTC

Technical Analysis

CVE-2025-1235 is an integer overflow vulnerability (CWE-190) affecting WAGO Fully Managed Switches model 0852-0303. The vulnerability arises from the device's handling of time values using a 32-bit signed integer, which is subject to the Year 2038 problem. Specifically, a low-privileged attacker can manipulate the device's date setting to January 19, 2038, the critical overflow point for 32-bit time representations. When this date is set, the internal time counter exceeds the maximum value representable by a 32-bit signed integer, causing an integer overflow or wraparound. As a result, the device's date resets to January 1, 1970, the Unix epoch start date. This erroneous time reset can lead to incorrect system logs, misaligned scheduled tasks, and potential disruption of time-dependent network functions. The vulnerability requires low privileges but no user interaction and can be exploited remotely (network vector). The CVSS v3.1 base score is 4.3, indicating a medium severity primarily due to the impact on integrity without affecting confidentiality or availability. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects all versions of the specified switch model, highlighting a systemic flaw in the time handling implementation.

Potential Impact

For European organizations, the impact of this vulnerability can be significant in environments relying on WAGO Fully Managed Switches 0852-0303 for critical network infrastructure. The incorrect system time can disrupt logging accuracy, complicating incident response and forensic investigations. Time-dependent protocols such as SNTP, NTP synchronization, certificate validation, and scheduled automation tasks may fail or behave unpredictably, potentially causing network instability or degraded service quality. While the vulnerability does not directly compromise confidentiality or availability, the integrity of network operations and monitoring is affected. This can lead to compliance issues, especially under regulations like GDPR, where accurate logging and audit trails are mandatory. Industrial and automation sectors using these switches may experience operational disruptions due to misaligned control sequences or event triggers. Given the low privilege required for exploitation, insider threats or compromised internal hosts could leverage this vulnerability to degrade network reliability.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls. Network administrators should restrict access to the management interfaces of WAGO switches to trusted personnel and networks only, employing network segmentation and strict access control lists (ACLs). Monitoring and alerting for unusual date/time changes on these devices should be established to detect exploitation attempts promptly. Where possible, disable remote date/time configuration or enforce authenticated and encrypted management protocols (e.g., SSH, HTTPS) to prevent unauthorized changes. Organizations should also prepare for patch deployment by maintaining close contact with WAGO for updates and testing firmware updates in controlled environments before production rollout. Additionally, integrating time synchronization from reliable external NTP servers can help maintain correct device time and potentially override malicious manual changes. Finally, updating incident response plans to consider time manipulation scenarios will improve resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-02-11T15:46:42.856Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683d4476182aa0cae237287d

Added to database: 6/2/2025, 6:28:06 AM

Last enriched: 7/9/2025, 12:25:09 PM

Last updated: 8/8/2025, 12:22:56 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats