Vulnerability Description
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wago | Pfc 200 Firmware | 03.00.39\(12\) |
| Wago | Pfc 200 | - |
| Wago | Pfc 100 Firmware | 03.00.39\(12\) |
| Wago | Pfc 100 | - |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0864ExploitThird Party Advisory
FAQ
What is CVE-2019-5075?
CVE-2019-5075 is a vulnerability with a CVSS score of 9.8 (CRITICAL). An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version...
How severe is CVE-2019-5075?
CVE-2019-5075 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-5075?
Check the references section above for vendor advisories and patch information. Affected products include: Wago Pfc 200 Firmware, Wago Pfc 200, Wago Pfc 100 Firmware, Wago Pfc 100.