Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3587: CWE-912 Hidden Functionality in WAGO Lean Managed Switch 852-1812

0
Critical
VulnerabilityCVE-2026-3587cvecve-2026-3587cwe-912
Published: Mon Mar 23 2026 (03/23/2026, 07:49:17 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: Lean Managed Switch 852-1812

Description

CVE-2026-3587 is a critical vulnerability in the WAGO Lean Managed Switch 852-1812 that allows an unauthenticated remote attacker to exploit a hidden CLI function to escape the restricted interface. This leads to full device compromise, including complete control over confidentiality, integrity, and availability. The vulnerability requires no authentication or user interaction and can be exploited remotely with low complexity. Although no known exploits are currently in the wild, the CVSS score of 10 reflects its severe impact and ease of exploitation. Organizations using this switch model are at high risk of network disruption and potential lateral movement by attackers. Immediate mitigation involves isolating affected devices and applying vendor patches once available. Countries with significant industrial automation and critical infrastructure deployments of WAGO products are most at risk. Defenders must prioritize detection of unauthorized CLI access attempts and restrict network exposure of management interfaces to trusted zones only.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:45:31 UTC

Technical Analysis

CVE-2026-3587 is a critical security vulnerability identified in the WAGO Lean Managed Switch 852-1812. The flaw stems from a hidden function within the device's command-line interface (CLI) prompt that can be exploited by an unauthenticated remote attacker. By leveraging this hidden functionality, the attacker can escape the restricted CLI environment, effectively bypassing any access controls designed to limit user capabilities. This escape leads to full compromise of the device, granting the attacker complete control over the switch’s configuration and operation. The vulnerability is classified under CWE-912 (Hidden Functionality), indicating that undocumented or unintended features are abused to gain unauthorized access. The CVSS 3.1 base score is 10.0, reflecting the highest severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), resulting in high confidentiality, integrity, and availability impacts (C:H/I:H/A:H). The affected product version is listed as 0.0.0, which likely indicates all current versions at the time of disclosure are vulnerable. No patches have been released yet, and no exploits are known in the wild. However, the nature of the vulnerability—remote, unauthenticated, and leading to full device compromise—makes it a critical risk for organizations relying on these switches for network infrastructure, especially in industrial or critical environments.

Potential Impact

The impact of CVE-2026-3587 is severe and multifaceted. Successful exploitation results in complete compromise of the WAGO Lean Managed Switch 852-1812, allowing attackers to manipulate network traffic, disrupt communications, and potentially pivot to other network segments. This can lead to loss of confidentiality through data interception or exfiltration, integrity breaches by altering configurations or injecting malicious traffic, and availability disruptions by disabling or destabilizing network operations. Given that these switches are often deployed in industrial automation and critical infrastructure environments, the compromise could have cascading effects on operational technology (OT) systems, causing physical process disruptions or safety hazards. The lack of authentication and user interaction requirements lowers the barrier for attackers, increasing the likelihood of exploitation. Organizations worldwide that depend on these devices for secure and reliable network management face heightened risks of espionage, sabotage, and operational downtime.

Mitigation Recommendations

To mitigate CVE-2026-3587, organizations should immediately implement network segmentation to isolate WAGO Lean Managed Switch 852-1812 devices from untrusted networks, especially the internet. Restrict management interface access strictly to trusted administrative networks using access control lists (ACLs) and firewall rules. Monitor network traffic for unusual CLI access attempts or unexpected command executions indicative of exploitation attempts. Employ network intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics tailored to detect anomalous CLI behavior. Until an official patch is released by WAGO, consider disabling remote management features if operationally feasible or replacing vulnerable devices with alternatives not affected by this vulnerability. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation efforts. Once patches become available, apply them promptly following thorough testing. Additionally, implement strong logging and alerting on management interfaces to detect and respond to unauthorized access quickly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-03-05T09:44:25.876Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c0f6b6f4197a8e3b21d85c

Added to database: 3/23/2026, 8:15:50 AM

Last enriched: 3/30/2026, 8:45:31 PM

Last updated: 5/7/2026, 4:30:44 AM

Views: 650

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses