Learn about CVE-2022-3281 affecting multiple WAGO products, leading to a loss of MAC-Address-Filtering after reboot. Follow mitigation steps for network security.
This article provides detailed information about CVE-2022-3281, a vulnerability in multiple WAGO products leading to a loss of MAC-Address-Filtering after reboot.
Understanding CVE-2022-3281
CVE-2022-3281 affects WAGO Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100, and Edge Controller in multiple versions, potentially allowing a remote attacker to bypass the MAC address filter.
What is CVE-2022-3281?
The vulnerability in WAGO products may result in a loss of MAC-Address-Filtering after a reboot, enabling unauthorized access to networks protected by the MAC address filter.
The Impact of CVE-2022-3281
The impact of CVE-2022-3281 is rated as HIGH with a CVSS v3.1 base score of 7.5. This could lead to a breach of integrity, allowing attackers to circumvent network protection mechanisms.
Technical Details of CVE-2022-3281
The technical details of CVE-2022-3281 include:
Vulnerability Description
A vulnerability in WAGO products could lead to a loss of MAC-Address-Filtering after a reboot, potentially allowing unauthorized network access.
Affected Systems and Versions
Various versions of WAGO products including Series PFC100/PFC200, Series Touch Panel 600, Compact Controller CC100, and Edge Controller are impacted by this vulnerability.
Exploitation Mechanism
Remote attackers can exploit this vulnerability to bypass MAC address filtering, compromising the security of the network.
Mitigation and Prevention
To mitigate the risks associated with CVE-2022-3281, consider the following:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Stay informed about security advisories from WAGO and apply patches and updates as soon as they are available to safeguard your systems.