Vulnerability Description
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wago | E\!Cockpit | 1.5.1.1 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0898ExploitThird Party Advisory
FAQ
What is CVE-2019-5106?
CVE-2019-5106 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway ...
How severe is CVE-2019-5106?
CVE-2019-5106 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5106?
Check the references section above for vendor advisories and patch information. Affected products include: Wago E\!Cockpit.