Skip to main content

CVE-2025-41664: CWE-732 Incorrect Permission Assignment for Critical Resource in WAGO Coupler 0750-0362

High
VulnerabilityCVE-2025-41664cvecve-2025-41664cwe-732
Published: Mon Sep 08 2025 (09/08/2025, 06:39:19 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: Coupler 0750-0362

Description

A low-privileged remote attacker could gain unauthorized access to critical resources, such as firmware and certificates, due to improper permission handling during the runtime of services (e.g., FTP/SFTP). This access could allow the attacker to escalate privileges and modify firmware.

AI-Powered Analysis

AILast updated: 09/08/2025, 07:01:59 UTC

Technical Analysis

CVE-2025-41664 is a high-severity vulnerability identified in the WAGO Coupler 0750-0362, an industrial automation component widely used in control systems. The vulnerability stems from CWE-732, which involves incorrect permission assignment for critical resources. Specifically, the issue arises due to improper permission handling during the runtime of services such as FTP and SFTP. This misconfiguration allows a low-privileged remote attacker to gain unauthorized access to sensitive resources, including firmware and security certificates. Once accessed, the attacker can escalate privileges and potentially modify the firmware, which could lead to persistent compromise of the device. The vulnerability has a CVSS 3.1 base score of 7.5, indicating a high impact on confidentiality, integrity, and availability. The attack vector is network-based (AV:N), requiring low privileges (PR:L) but high attack complexity (AC:H), and no user interaction (UI:N). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been published yet. This vulnerability is critical in the context of industrial control systems where firmware integrity and secure certificate management are paramount for operational safety and reliability.

Potential Impact

For European organizations, especially those operating in critical infrastructure sectors such as energy, manufacturing, and utilities, this vulnerability poses a significant risk. Unauthorized access to firmware and certificates can lead to manipulation of device behavior, disruption of industrial processes, and potential safety hazards. Compromised firmware could enable attackers to create backdoors, disrupt communications, or cause physical damage through control system manipulation. The high impact on confidentiality, integrity, and availability means that sensitive operational data could be exposed or altered, leading to operational downtime and financial losses. Additionally, the lack of available patches increases the window of exposure. Given the increasing reliance on industrial automation in Europe and stringent regulatory requirements (e.g., NIS Directive), exploitation of this vulnerability could result in regulatory penalties and reputational damage.

Mitigation Recommendations

Organizations should immediately conduct an inventory to identify the presence of WAGO Coupler 0750-0362 devices within their networks. Network segmentation should be enforced to isolate these devices from general IT networks and restrict access to trusted management hosts only. Access to FTP/SFTP services on these devices should be disabled if not strictly necessary or replaced with more secure transfer methods. Monitoring network traffic for unusual access patterns to these services can help detect potential exploitation attempts. Since no patches are currently available, applying compensating controls such as strict firewall rules, VPN access for management, and multi-factor authentication for administrative access is critical. Regular firmware integrity checks and certificate validation should be implemented to detect unauthorized modifications. Coordination with WAGO for timely patch releases and applying updates as soon as they become available is essential. Additionally, incident response plans should be updated to address potential firmware compromise scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.307Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68be7bbdd5a2966cfc7c4f89

Added to database: 9/8/2025, 6:46:21 AM

Last enriched: 9/8/2025, 7:01:59 AM

Last updated: 9/9/2025, 11:25:14 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats