Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41732: CWE-121 Stack-based Buffer Overflow in WAGO Indsutrial-Managed-Switches

0
High
VulnerabilityCVE-2025-41732cvecve-2025-41732cwe-121
Published: Wed Dec 10 2025 (12/10/2025, 11:04:37 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: Indsutrial-Managed-Switches

Description

An unauthenticated remote attacker can abuse unsafe sscanf calls within the check_cookie() function to write arbitrary data into fixed-size stack buffers which leads to full device compromise.

AI-Powered Analysis

AILast updated: 12/10/2025, 11:28:50 UTC

Technical Analysis

CVE-2025-41732 is a stack-based buffer overflow vulnerability classified under CWE-121, affecting WAGO Industrial-Managed-Switches. The flaw is caused by unsafe usage of the sscanf function within the check_cookie() function, which improperly handles input data, allowing an unauthenticated remote attacker to overwrite fixed-size stack buffers with arbitrary data. This memory corruption can lead to execution of arbitrary code, resulting in full compromise of the affected device. The vulnerability is remotely exploitable without any authentication, though it requires some form of user interaction, likely in the form of sending crafted network packets or requests that trigger the vulnerable code path. The CVSS v3.1 base score is 8.8, indicating a high severity with network attack vector, low attack complexity, no privileges required, user interaction needed, and high impact on confidentiality, integrity, and availability. The vulnerability affects all versions identified as 0.0.0, suggesting it is present in initial or early firmware releases. No patches or known exploits in the wild are currently documented, but the potential impact on industrial network devices is critical given their role in operational technology environments. The vulnerability could allow attackers to gain control over network switches that manage industrial communications, potentially disrupting industrial processes or enabling lateral movement within critical infrastructure networks.

Potential Impact

For European organizations, especially those in manufacturing, energy, utilities, and critical infrastructure sectors, this vulnerability poses a significant threat. Compromise of WAGO Industrial-Managed-Switches could lead to disruption of industrial control systems, causing operational downtime, safety hazards, and potential data breaches. The integrity and availability of industrial networks could be severely impacted, leading to cascading effects on production lines and essential services. Confidentiality breaches could expose sensitive operational data or credentials. Given the critical role of such switches in industrial environments, exploitation could facilitate further attacks on connected systems or allow attackers to manipulate industrial processes. The lack of authentication requirement increases the risk of remote exploitation, potentially from external threat actors targeting European industrial networks. The threat is particularly relevant for organizations with direct internet exposure of management interfaces or insufficient network segmentation.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement immediate compensating controls. These include isolating WAGO Industrial-Managed-Switches from untrusted networks and restricting management interface access to trusted internal networks only. Employ strict network segmentation and firewall rules to limit exposure. Monitor network traffic for anomalous patterns that could indicate exploitation attempts, especially malformed packets targeting the check_cookie() function. Disable or restrict any unnecessary services or interfaces on the switches to reduce attack surface. Implement intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect buffer overflow attempts or suspicious sscanf usage patterns. Regularly audit and update device firmware once patches become available from WAGO. Additionally, conduct thorough asset inventories to identify all affected devices and prioritize remediation efforts in critical environments. Engage with WAGO support channels for updates and guidance on forthcoming patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.319Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69395606e27bef3ae4b69151

Added to database: 12/10/2025, 11:14:14 AM

Last enriched: 12/10/2025, 11:28:50 AM

Last updated: 12/11/2025, 6:10:07 AM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats