Vulnerability Description
An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wago | Pfc200 Firmware | 03.00.39\(12\) |
| Wago | Pfc200 | - |
| Wago | Pfc100 Firmware | 03.00.39\(12\) |
| Wago | Pfc100 | - |
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0923ExploitThird Party Advisory
FAQ
What is CVE-2019-5134?
CVE-2019-5134 is a vulnerability with a CVSS score of 7.5 (HIGH). An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PF...
How severe is CVE-2019-5134?
CVE-2019-5134 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5134?
Check the references section above for vendor advisories and patch information. Affected products include: Wago Pfc200 Firmware, Wago Pfc200, Wago Pfc100 Firmware, Wago Pfc100.