Vulnerability Description
An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wago | Pfc 200 Firmware | 03.00.39\(12\) |
| Wago | Pfc 200 | - |
| Wago | Pfc 100 Firmware | 03.00.39\(12\) |
| Wago | Pfc 100 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0862ExploitThird Party Advisory
FAQ
What is CVE-2019-5073?
CVE-2019-5073 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware vers...
How severe is CVE-2019-5073?
CVE-2019-5073 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5073?
Check the references section above for vendor advisories and patch information. Affected products include: Wago Pfc 200 Firmware, Wago Pfc 200, Wago Pfc 100 Firmware, Wago Pfc 100.