CVE-2024-1490
Description
An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run arbitrary commands on the device.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An authenticated high-privilege attacker can execute arbitrary shell commands on a WAGO PLC via its web-based management interface when OpenVPN is enabled.
Vulnerability
Description
The vulnerability resides in the Web-Based Management (WBM) function of WAGO PLCs when OpenVPN is enabled [1]. An authenticated attacker with high privileges can exploit the OpenVPN configuration to execute arbitrary shell commands [1]. The root cause involves user-defined scripts being permitted within the OpenVPN configuration, allowing command injection that bypasses intended restrictions.
Attack
Vector
Exploitation requires an attacker to be authenticated to the web-based management interface with high privileges, such as administrative access [1]. The attack is performed remotely over the network, targeting the WBM function while OpenVPN is active. No additional user interaction is needed beyond the initial authentication and configuration manipulation.
Impact
Successful exploitation allows the attacker to run arbitrary shell commands on the affected device [1]. This can lead to full system compromise, including data exfiltration, installation of persistent malware, or disruption of the PLC's control functions. The severity is rated High with a CVSS v3 score of 7.2.
Mitigation
The vendor, WAGO GmbH & Co. KG, has released an advisory (VDE-2024-008) detailing the vulnerability [1]. Users should apply the recommended firmware updates or configuration changes to disable user-defined OpenVPN scripts if not required. At the time of publication, no public exploit code has been reported.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.