CVE-2026-22906: CWE-321 Use of Hard-coded Cryptographic Key in WAGO 0852-1322
CVE-2026-22906 is a critical vulnerability in the WAGO 0852-1322 device where user credentials are encrypted using AES-ECB with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the configuration file can decrypt and recover plaintext usernames and passwords. This vulnerability does not require authentication or user interaction and allows full compromise of confidentiality, integrity, and availability of the device. The CVSS score is 9. 8, reflecting its critical severity. No patches are currently available, and while no exploits are known in the wild, the risk is high due to the ease of exploitation. European organizations using WAGO 0852-1322 devices, especially in industrial automation and critical infrastructure, are at significant risk. Mitigation involves restricting access to configuration files, network segmentation, and monitoring for unauthorized access. Countries with strong industrial automation sectors and critical infrastructure reliance on WAGO products, such as Germany, France, and the Netherlands, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2026-22906 is a critical cryptographic vulnerability affecting the WAGO 0852-1322 industrial automation device. The vulnerability arises from the use of AES encryption in ECB mode with a hardcoded cryptographic key to protect user credentials stored in the device's configuration files. AES-ECB mode is inherently insecure for encrypting multiple blocks of data because it does not use an initialization vector, making patterns in plaintext visible in ciphertext. The use of a hardcoded key further exacerbates the issue, as attackers can easily obtain the key from reverse engineering or leaked documentation. An unauthenticated remote attacker who gains access to the configuration file can decrypt it offline to recover plaintext usernames and passwords. This vulnerability is especially dangerous when combined with an authentication bypass, allowing attackers to fully compromise the device without any credentials. The CVSS 3.1 base score of 9.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. No patches have been released yet, and no known exploits are reported in the wild, but the vulnerability's characteristics make exploitation straightforward once the configuration file is obtained. The vulnerability is categorized under CWE-321 (Use of Hard-coded Cryptographic Key), highlighting poor cryptographic design and implementation. Given WAGO's prominence in industrial control systems, this vulnerability poses a significant risk to operational technology environments.
Potential Impact
The impact of CVE-2026-22906 on European organizations is severe, particularly those in industrial automation, manufacturing, energy, and critical infrastructure sectors that deploy WAGO 0852-1322 devices. Successful exploitation allows attackers to recover plaintext credentials, enabling unauthorized access to control systems. This can lead to manipulation or disruption of industrial processes, data theft, and potential physical damage or safety hazards. The compromise of device integrity and availability can cause operational downtime, financial losses, and reputational damage. Confidentiality breaches may expose sensitive operational data or intellectual property. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks. European organizations face increased threat due to the high adoption of WAGO products in key industries and the strategic importance of maintaining secure industrial control systems to prevent sabotage or espionage. The lack of available patches further elevates the risk, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Restrict access to configuration files by implementing strict network segmentation and access control lists (ACLs) to limit exposure to trusted management networks only. 2. Employ strong perimeter defenses such as firewalls and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access device configuration files. 3. Regularly audit and monitor device configurations and network traffic for signs of unauthorized access or exfiltration attempts. 4. Use VPNs or secure management channels to access devices remotely, avoiding exposure of configuration files over unsecured networks. 5. Implement compensating controls such as multi-factor authentication (MFA) on management interfaces to reduce risk from credential compromise. 6. Engage with WAGO support and vendors to obtain updates or patches as soon as they become available. 7. Consider device replacement or firmware upgrades if no patch is forthcoming and risk is unacceptable. 8. Educate operational technology (OT) security teams on the vulnerability specifics and response procedures. 9. Maintain offline backups of device configurations to enable recovery in case of compromise. 10. Collaborate with industry information sharing groups to stay informed about emerging exploits or mitigations.
Affected Countries
Germany, France, Netherlands, Italy, Belgium, Sweden
CVE-2026-22906: CWE-321 Use of Hard-coded Cryptographic Key in WAGO 0852-1322
Description
CVE-2026-22906 is a critical vulnerability in the WAGO 0852-1322 device where user credentials are encrypted using AES-ECB with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the configuration file can decrypt and recover plaintext usernames and passwords. This vulnerability does not require authentication or user interaction and allows full compromise of confidentiality, integrity, and availability of the device. The CVSS score is 9. 8, reflecting its critical severity. No patches are currently available, and while no exploits are known in the wild, the risk is high due to the ease of exploitation. European organizations using WAGO 0852-1322 devices, especially in industrial automation and critical infrastructure, are at significant risk. Mitigation involves restricting access to configuration files, network segmentation, and monitoring for unauthorized access. Countries with strong industrial automation sectors and critical infrastructure reliance on WAGO products, such as Germany, France, and the Netherlands, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-22906 is a critical cryptographic vulnerability affecting the WAGO 0852-1322 industrial automation device. The vulnerability arises from the use of AES encryption in ECB mode with a hardcoded cryptographic key to protect user credentials stored in the device's configuration files. AES-ECB mode is inherently insecure for encrypting multiple blocks of data because it does not use an initialization vector, making patterns in plaintext visible in ciphertext. The use of a hardcoded key further exacerbates the issue, as attackers can easily obtain the key from reverse engineering or leaked documentation. An unauthenticated remote attacker who gains access to the configuration file can decrypt it offline to recover plaintext usernames and passwords. This vulnerability is especially dangerous when combined with an authentication bypass, allowing attackers to fully compromise the device without any credentials. The CVSS 3.1 base score of 9.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability, with no privileges or user interaction required and network attack vector. No patches have been released yet, and no known exploits are reported in the wild, but the vulnerability's characteristics make exploitation straightforward once the configuration file is obtained. The vulnerability is categorized under CWE-321 (Use of Hard-coded Cryptographic Key), highlighting poor cryptographic design and implementation. Given WAGO's prominence in industrial control systems, this vulnerability poses a significant risk to operational technology environments.
Potential Impact
The impact of CVE-2026-22906 on European organizations is severe, particularly those in industrial automation, manufacturing, energy, and critical infrastructure sectors that deploy WAGO 0852-1322 devices. Successful exploitation allows attackers to recover plaintext credentials, enabling unauthorized access to control systems. This can lead to manipulation or disruption of industrial processes, data theft, and potential physical damage or safety hazards. The compromise of device integrity and availability can cause operational downtime, financial losses, and reputational damage. Confidentiality breaches may expose sensitive operational data or intellectual property. The vulnerability's ease of exploitation without authentication increases the risk of widespread attacks. European organizations face increased threat due to the high adoption of WAGO products in key industries and the strategic importance of maintaining secure industrial control systems to prevent sabotage or espionage. The lack of available patches further elevates the risk, necessitating immediate mitigation efforts.
Mitigation Recommendations
1. Restrict access to configuration files by implementing strict network segmentation and access control lists (ACLs) to limit exposure to trusted management networks only. 2. Employ strong perimeter defenses such as firewalls and intrusion detection/prevention systems (IDS/IPS) to monitor and block unauthorized attempts to access device configuration files. 3. Regularly audit and monitor device configurations and network traffic for signs of unauthorized access or exfiltration attempts. 4. Use VPNs or secure management channels to access devices remotely, avoiding exposure of configuration files over unsecured networks. 5. Implement compensating controls such as multi-factor authentication (MFA) on management interfaces to reduce risk from credential compromise. 6. Engage with WAGO support and vendors to obtain updates or patches as soon as they become available. 7. Consider device replacement or firmware upgrades if no patch is forthcoming and risk is unacceptable. 8. Educate operational technology (OT) security teams on the vulnerability specifics and response procedures. 9. Maintain offline backups of device configurations to enable recovery in case of compromise. 10. Collaborate with industry information sharing groups to stay informed about emerging exploits or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2026-01-13T08:33:25.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6989944b4b57a58fa134d4d6
Added to database: 2/9/2026, 8:01:15 AM
Last enriched: 2/9/2026, 8:15:39 AM
Last updated: 2/9/2026, 9:01:33 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25916: CWE-420 Unprotected Alternate Channel in Roundcube Webmail
MediumCVE-2025-7799: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Zirve Information Technologies Inc. e-Taxpayer Accounting Website
HighCVE-2026-2223: SQL Injection in code-projects Online Reviewer System
MediumCVE-2026-22905: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WAGO 0852-1322
HighCVE-2026-22904: CWE-121 Stack-based Buffer Overflow in WAGO 0852-1322
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.