Westermo WeOS 5 Vulnerability: Remote Reboot Risk with a Side of ESP Packet Giggles!

View CSAF: Beware of the reboot! Westermo’s WeOS 5 is having a mid-life crisis with its improper validation of input. The device could be vulnerable to denial-of-service attacks, potentially causing spontaneous reboots. Upgrade to WeOS 5.24.0 for a more stable network experience—because nobody wants their router throwing tantrums.

Pro Dashboard

Hot Take:

Looks like Westermo’s WeOS 5 has a new party trick: a spontaneous reboot! Forget about hitting the snooze button on your alarm clock – this vulnerability will wake you up with a full system restart, whether you like it or not. At least, for now, your dreams of an uninterrupted nap might have to wait until version 5.24.0.

Key Points:

  • Westermo Network Technologies’ WeOS 5 is vulnerable to a denial-of-service (DoS) attack.
  • The vulnerability can be exploited using a specifically crafted ESP packet, causing the device to reboot.
  • This affects WeOS 5 versions 5.23.0 and prior, with a CVSS v4 score of 8.2.
  • Mitigation includes upgrading to WeOS 5 version 5.24.0 and implementing network security best practices.
  • Westermo reported this vulnerability to CISA, with no known public exploitation at this time.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?