Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22906: CWE-321 Use of Hard-coded Cryptographic Key in WAGO 0852-1322

0
Critical
VulnerabilityCVE-2026-22906cvecve-2026-22906cwe-321
Published: Mon Feb 09 2026 (02/09/2026, 07:40:33 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: 0852-1322

Description

CVE-2026-22906 is a critical vulnerability in the WAGO 0852-1322 device where user credentials are encrypted using AES-ECB with a hardcoded cryptographic key. An unauthenticated remote attacker who obtains the device's configuration file can decrypt and recover plaintext usernames and passwords. This vulnerability allows full compromise of confidentiality, integrity, and availability without requiring authentication or user interaction. The weakness stems from the use of a static, hardcoded key combined with the insecure AES-ECB mode, which is susceptible to cryptanalysis. Although no exploits are currently known in the wild, the high CVSS score of 9. 8 reflects the ease of exploitation and severe impact. European organizations using WAGO 0852-1322 devices, especially in industrial automation and critical infrastructure, are at significant risk. Immediate mitigation involves restricting access to configuration files, monitoring for unauthorized access, and applying vendor patches once available. Countries with extensive industrial automation deployments, such as Germany, France, and the Netherlands, are most likely to be affected due to WAGO’s market presence and critical infrastructure reliance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/16/2026, 13:32:26 UTC

Technical Analysis

CVE-2026-22906 identifies a severe cryptographic vulnerability in the WAGO 0852-1322 industrial automation device. The device stores user credentials encrypted with AES in ECB mode using a hardcoded cryptographic key embedded in the firmware. AES-ECB mode is inherently insecure for encrypting multiple blocks of data because it does not use an initialization vector, leading to pattern leakage. The use of a hardcoded key further exacerbates the issue, as an attacker who obtains the configuration file can decrypt the stored credentials without needing to guess or brute-force the key. The vulnerability allows unauthenticated remote attackers to retrieve the configuration file, which contains the encrypted credentials. Once decrypted, attackers gain access to plaintext usernames and passwords, enabling them to bypass authentication mechanisms and potentially take full control of the device. This compromises confidentiality (exposure of credentials), integrity (potential unauthorized configuration changes), and availability (disruption or control of device operations). The CVSS v3.1 score of 9.8 reflects the vulnerability’s critical nature, with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. No patches are currently available, and no exploits have been reported in the wild, but the risk is high given the ease of exploitation and the critical role of these devices in industrial environments.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a significant threat. Compromise of WAGO 0852-1322 devices can lead to unauthorized access to control systems, potentially causing operational disruptions, safety hazards, and data breaches. Attackers could manipulate device configurations, disrupt industrial processes, or use compromised devices as pivot points for further network intrusion. The exposure of plaintext credentials undermines trust in device security and may lead to broader network compromise. Given the critical nature of industrial control systems in Europe’s energy, manufacturing, and transportation sectors, exploitation could have cascading effects on national infrastructure and economic stability. The lack of authentication requirements and ease of remote exploitation increase the urgency for affected organizations to act swiftly.

Mitigation Recommendations

Organizations should immediately restrict access to configuration files by implementing strict network segmentation and access controls limiting who can retrieve device configurations. Employ network monitoring to detect unusual access patterns or attempts to download configuration files. Use VPNs or secure management channels to access devices remotely. Since no patches are currently available, consider deploying compensating controls such as disabling remote configuration retrieval if possible or isolating vulnerable devices from external networks. Engage with WAGO for updates and apply patches promptly once released. Conduct thorough audits of device configurations and credentials, and rotate passwords after remediation. Implement intrusion detection systems tailored for industrial control networks to identify exploitation attempts. Train staff on the risks associated with hardcoded keys and insecure encryption practices to improve overall security posture.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-13T08:33:25.684Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989944b4b57a58fa134d4d6

Added to database: 2/9/2026, 8:01:15 AM

Last enriched: 2/16/2026, 1:32:26 PM

Last updated: 3/26/2026, 4:16:29 AM

Views: 572

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses