CVE-2025-41664: CWE-732 Incorrect Permission Assignment for Critical Resource in WAGO Coupler 0750-0362
A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.
AI Analysis
Technical Summary
CVE-2025-41664 is a high-severity vulnerability identified in the WAGO Coupler 0750-0362, an industrial automation component widely used in control systems. The vulnerability stems from CWE-732, which involves incorrect permission assignment for critical resources. Specifically, the issue arises due to improper permission handling during the runtime of services such as FTP and SFTP. This misconfiguration allows a low-privileged remote attacker to gain unauthorized access to sensitive resources, including firmware and security certificates. Once accessed, the attacker can escalate privileges and potentially modify the firmware, which could lead to persistent compromise of the device. The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requiring low privileges (PR:L) but high attack complexity (AC:H), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability is critical in the context of industrial control systems where firmware integrity and secure certificate management are paramount for operational safety and reliability.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, and utilities, this vulnerability poses a significant risk. Unauthorized access to firmware and certificates can lead to manipulation of device behavior, disruption of industrial processes, and potential safety hazards. Compromised firmware could enable attackers to create backdoors, disrupt communications, or cause physical damage through control system manipulation. The high impact on confidentiality, integrity, and availability means that sensitive operational data could be exposed or altered, leading to operational downtime and financial losses. Additionally, the lack of available patches increases the window of exposure. Given the increasing reliance on industrial automation in Europe and stringent regulatory requirements (e.g., NIS Directive), exploitation of this vulnerability could result in regulatory penalties and reputational damage.
Mitigation Recommendations
Organizations should immediately conduct an inventory to identify the presence of WAGO Coupler 0750-0362 devices within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management hosts only. Access to FTP/SFTP services on these devices should be disabled if not strictly necessary or replaced with more secure transfer methods. Monitoring network traffic for unusual access patterns to these services can help detect potential exploitation attempts. Since no patches are currently available, applying compensating controls such as strict firewall rules, VPN access for management, and multi-factor authentication for administrative access is critical. Regular firmware integrity checks and certificate validation should be implemented to detect unauthorized modifications. Coordination with WAGO for timely patch releases and applying updates as soon as they become available is essential. Additionally, incident response plans should be updated to address potential firmware compromise scenarios.
Affected Countries
Germany, France, Italy, Netherlands, Belgium, Poland, Spain, Sweden
CVE-2025-41664: CWE-732 Incorrect Permission Assignment for Critical Resource in WAGO Coupler 0750-0362
Description
A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.
AI-Powered Analysis
Technical Analysis
CVE-2025-41664 is a high-severity vulnerability identified in the WAGO Coupler 0750-0362, an industrial automation component widely used in control systems. The vulnerability stems from CWE-732, which involves incorrect permission assignment for critical resources. Specifically, the issue arises due to improper permission handling during the runtime of services such as FTP and SFTP. This misconfiguration allows a low-privileged remote attacker to gain unauthorized access to sensitive resources, including firmware and security certificates. Once accessed, the attacker can escalate privileges and potentially modify the firmware, which could lead to persistent compromise of the device. The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requiring low privileges (PR:L) but high attack complexity (AC:H), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability is critical in the context of industrial control systems where firmware integrity and secure certificate management are paramount for operational safety and reliability.
Potential Impact
For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, and utilities, this vulnerability poses a significant risk. Unauthorized access to firmware and certificates can lead to manipulation of device behavior, disruption of industrial processes, and potential safety hazards. Compromised firmware could enable attackers to create backdoors, disrupt communications, or cause physical damage through control system manipulation. The high impact on confidentiality, integrity, and availability means that sensitive operational data could be exposed or altered, leading to operational downtime and financial losses. Additionally, the lack of available patches increases the window of exposure. Given the increasing reliance on industrial automation in Europe and stringent regulatory requirements (e.g., NIS Directive), exploitation of this vulnerability could result in regulatory penalties and reputational damage.
Mitigation Recommendations
Organizations should immediately conduct an inventory to identify the presence of WAGO Coupler 0750-0362 devices within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management hosts only. Access to FTP/SFTP services on these devices should be disabled if not strictly necessary or replaced with more secure transfer methods. Monitoring network traffic for unusual access patterns to these services can help detect potential exploitation attempts. Since no patches are currently available, applying compensating controls such as strict firewall rules, VPN access for management, and multi-factor authentication for administrative access is critical. Regular firmware integrity checks and certificate validation should be implemented to detect unauthorized modifications. Coordination with WAGO for timely patch releases and applying updates as soon as they become available is essential. Additionally, incident response plans should be updated to address potential firmware compromise scenarios.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.307Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68be7bbdd5a2966cfc7c4f89
Added to database: 9/8/2025, 6:46:21 AM
Last enriched: 9/8/2025, 7:01:59 AM
Last updated: 9/9/2025, 11:25:14 AM
Views: 14
Related Threats
CVE-2025-9166: CWE-476: NULL Pointer Dereference in Rockwell Automation ControlLogix® 5580
HighCVE-2025-9160: CWE-306: Missing Authentication for Critical Function in Rockwell Automation CompactLogix® 5480
HighCVE-2025-8008: CWE-755: Improper Handling of Exceptional Conditions in Rockwell Automation 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT
HighCVE-2025-8007: CWE-20: Improper Input Validation in Rockwell Automation 1756-ENT2R, 1756-EN4TR, 1756-EN4TRXT
HighCVE-2025-8277: Missing Release of Memory after Effective Lifetime in Red Hat Red Hat Enterprise Linux 10
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.