Vulnerability Description
An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers as a part of executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update package file using any zip utility. The user must initiate a firmware update through e!COCKPIT and choose the malicious wup file using the file browser to trigger the vulnerability.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wago | E\!Cockpit | 1.6.0.7 |
Related Weaknesses (CWE)
References
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952ExploitThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952ExploitThird Party Advisory
FAQ
What is CVE-2019-5159?
CVE-2019-5159 is a vulnerability with a CVSS score of 7.8 (HIGH). An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an...
How severe is CVE-2019-5159?
CVE-2019-5159 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5159?
Check the references section above for vendor advisories and patch information. Affected products include: Wago E\!Cockpit.