CVE-2024-1490
Published: 09 April 2026
Summary
CVE-2024-1490 is a high-severity Code Injection (CWE-94) vulnerability in Certvde (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, ranked at the 26.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through vendor patching directly eliminates the code injection vulnerability in the OpenVPN configuration feature.
Least functionality restricts or prohibits user-defined scripts in OpenVPN, preventing the prerequisite condition for arbitrary shell command execution.
Information input validation on the web-based management interface blocks malicious code injection into OpenVPN configurations.
NVD Description
An authenticated remote attacker with high privileges can exploit the OpenVPN configuration via the web-based management interface of a WAGO PLC. If user-defined scripts are permitted, OpenVPN may allow the execution of arbitrary shell commands enabling the attacker to run…
more
arbitrary commands on the device.
Deeper analysisAI
CVE-2024-1490 is a code injection vulnerability (CWE-94) in the OpenVPN configuration feature accessible via the web-based management interface of WAGO PLC devices. Published on 2026-04-09, it enables an authenticated remote attacker with high privileges to execute arbitrary shell commands on the device, provided that user-defined scripts are permitted in the OpenVPN setup. The vulnerability carries a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H), indicating high impact on confidentiality, integrity, and availability.
Exploitation requires an attacker to first gain high-privilege authenticated access remotely over the network. From there, they can manipulate the OpenVPN configuration through the web interface to inject and trigger arbitrary shell commands, achieving full remote code execution on the PLC. This could allow complete device compromise, such as data exfiltration, modification of PLC operations, or further lateral movement in industrial environments.
Mitigation guidance is detailed in advisories including VDE-2024-008 from CERT VDE (https://certvde.com/de/advisories/VDE-2024-008) and the associated CSAF provider JSON (https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2024-008.json). Security practitioners should consult these for patching instructions, configuration hardening, and disabling unnecessary user-defined scripts in OpenVPN.
Details
- CWE(s)