CVE-2026-22906: CWE-321 Use of Hard-coded Cryptographic Key in WAGO 0852-1322
CVE-2026-22906 is a critical vulnerability in the WAGO 0852-1322 device where user credentials are encrypted using AES-ECB with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the device's configuration file can decrypt and recover plaintext usernames and passwords. This vulnerability allows full compromise of confidentiality, integrity, and availability without requiring authentication or user interaction. The weakness stems from the use of a static, hardcoded key combined with the insecure AES-ECB mode, which is susceptible to cryptanalysis. Although no exploits are currently known in the wild, the high CVSS score of 9. 8 reflects the ease of exploitation and severe impact. European organizations using WAGO 0852-1322 devices, especially in industrial automation and critical infrastructure, are at significant risk. Immediate mitigation involves restricting access to configuration files, monitoring for unauthorized access, and applying vendor patches once available. Countries with extensive industrial automation deployments, such as Germany, France, and the Netherlands, are most likely to be affected due to WAGO’s market presence and critical infrastructure reliance.
AI Analysis
Technical Summary
CVE-2026-22906 identifies a severe cryptographic vulnerability in the WAGO 0852-1322 industrial automation device. The device stores user credentials encrypted with AES in ECB mode using a hardcoded cryptographic key embedded in the firmware. AES-ECB mode is inherently insecure for encrypting multiple blocks of data because it does not use an initialization vector, leading to pattern leakage. The use of a hardcoded key further exacerbates the issue, as an attacker who obtains the configuration file can decrypt the stored credentials without needing to guess or brute-force the key. The vulnerability allows unauthenticated remote attackers to retrieve the configuration file, which contains the encrypted credentials. Once decrypted, attackers gain access to plaintext usernames and passwords, enabling them to bypass authentication mechanisms and potentially take full control of the device. This compromises confidentiality (exposure of credentials), integrity (potential unauthorized configuration changes), and availability (disruption or control of device operations). The CVSS v3.1 score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No patches are currently available, and no exploits have been reported in the wild, but the risk is high given the ease of exploitation and the critical role of these devices in industrial environments.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant threat. Compromise of WAGO 0852-1322 devices can lead to unauthorized access to control systems, potentially causing operational disruptions, safety hazards, and data breaches. Attackers could manipulate device configurations, disrupt industrial processes, or use compromised devices as pivot points for further network intrusion. The exposure of plaintext credentials undermines trust in device security and may lead to broader network compromise. Given the critical nature of industrial control systems in Europe’s energy, manufacturing, and transportation sectors, exploitation could have cascading effects on national infrastructure and economic stability. The lack of authentication requirements and ease of remote exploitation increase the urgency for affected organizations to act swiftly.
Mitigation Recommendations
Organizations should immediately restrict access to configuration files by implementing strict network segmentation and access controls limiting who can retrieve device configurations. Employ network monitoring to detect unusual access patterns or attempts to download configuration files. Use VPNs or secure management channels to access devices remotely. Since no patches are currently available, consider deploying compensating controls such as disabling remote configuration retrieval if possible or isolating vulnerable devices from external networks. Engage with WAGO for updates and apply patches promptly once released. Conduct thorough audits of device configurations and credentials, and rotate passwords after remediation. Implement intrusion detection systems tailored for industrial control networks to identify exploitation attempts. Train staff on the risks associated with hardcoded keys and insecure encryption practices to improve overall security posture.
Affected Countries
Germany, France, Netherlands, Belgium, Italy, Poland, United Kingdom
CVE-2026-22906: CWE-321 Use of Hard-coded Cryptographic Key in WAGO 0852-1322
Description
CVE-2026-22906 is a critical vulnerability in the WAGO 0852-1322 device where user credentials are encrypted using AES-ECB with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the device's configuration file can decrypt and recover plaintext usernames and passwords. This vulnerability allows full compromise of confidentiality, integrity, and availability without requiring authentication or user interaction. The weakness stems from the use of a static, hardcoded key combined with the insecure AES-ECB mode, which is susceptible to cryptanalysis. Although no exploits are currently known in the wild, the high CVSS score of 9. 8 reflects the ease of exploitation and severe impact. European organizations using WAGO 0852-1322 devices, especially in industrial automation and critical infrastructure, are at significant risk. Immediate mitigation involves restricting access to configuration files, monitoring for unauthorized access, and applying vendor patches once available. Countries with extensive industrial automation deployments, such as Germany, France, and the Netherlands, are most likely to be affected due to WAGO’s market presence and critical infrastructure reliance.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-22906 identifies a severe cryptographic vulnerability in the WAGO 0852-1322 industrial automation device. The device stores user credentials encrypted with AES in ECB mode using a hardcoded cryptographic key embedded in the firmware. AES-ECB mode is inherently insecure for encrypting multiple blocks of data because it does not use an initialization vector, leading to pattern leakage. The use of a hardcoded key further exacerbates the issue, as an attacker who obtains the configuration file can decrypt the stored credentials without needing to guess or brute-force the key. The vulnerability allows unauthenticated remote attackers to retrieve the configuration file, which contains the encrypted credentials. Once decrypted, attackers gain access to plaintext usernames and passwords, enabling them to bypass authentication mechanisms and potentially take full control of the device. This compromises confidentiality (exposure of credentials), integrity (potential unauthorized configuration changes), and availability (disruption or control of device operations). The CVSS v3.1 score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No patches are currently available, and no exploits have been reported in the wild, but the risk is high given the ease of exploitation and the critical role of these devices in industrial environments.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant threat. Compromise of WAGO 0852-1322 devices can lead to unauthorized access to control systems, potentially causing operational disruptions, safety hazards, and data breaches. Attackers could manipulate device configurations, disrupt industrial processes, or use compromised devices as pivot points for further network intrusion. The exposure of plaintext credentials undermines trust in device security and may lead to broader network compromise. Given the critical nature of industrial control systems in Europe’s energy, manufacturing, and transportation sectors, exploitation could have cascading effects on national infrastructure and economic stability. The lack of authentication requirements and ease of remote exploitation increase the urgency for affected organizations to act swiftly.
Mitigation Recommendations
Organizations should immediately restrict access to configuration files by implementing strict network segmentation and access controls limiting who can retrieve device configurations. Employ network monitoring to detect unusual access patterns or attempts to download configuration files. Use VPNs or secure management channels to access devices remotely. Since no patches are currently available, consider deploying compensating controls such as disabling remote configuration retrieval if possible or isolating vulnerable devices from external networks. Engage with WAGO for updates and apply patches promptly once released. Conduct thorough audits of device configurations and credentials, and rotate passwords after remediation. Implement intrusion detection systems tailored for industrial control networks to identify exploitation attempts. Train staff on the risks associated with hardcoded keys and insecure encryption practices to improve overall security posture.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2026-01-13T08:33:25.684Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6989944b4b57a58fa134d4d6
Added to database: 2/9/2026, 8:01:15 AM
Last enriched: 2/16/2026, 1:32:26 PM
Last updated: 3/26/2026, 4:16:29 AM
Views: 572
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.