ID

VAR-201912-0772


CVE

CVE-2019-5073


TITLE

WAGO PFC200 Information Disclosure Vulnerability

Trust: 0.8

sources: IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f // CNVD: CNVD-2019-46397

DESCRIPTION

An exploitable information exposure vulnerability exists in the iocheckd service "I/O-Check" functionality of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets can cause an external tool to fail, resulting in uninitialized stack data to be copied to the response packet buffer. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware contains an information disclosure vulnerability.Information may be obtained. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has an information disclosure vulnerability. The vulnerability stems from configuration errors during the operation of the network system or product. An attacker could use this vulnerability to obtain sensitive information about the affected components

Trust: 2.34

sources: NVD: CVE-2019-5073 // JVNDB: JVNDB-2019-013744 // CNVD: CNVD-2019-46397 // IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f // CNVD: CNVD-2019-46397

AFFECTED PRODUCTS

vendor:wagomodel:pfc200scope:eqversion:03.01.07(13)

Trust: 1.4

vendor:wagomodel:pfc200scope:eqversion:03.00.39(12)

Trust: 1.4

vendor:wagomodel:pfc100scope:eqversion:03.00.39(12)

Trust: 1.4

vendor:wagomodel:pfc 100scope:eqversion:03.00.39\(12\)

Trust: 1.0

vendor:wagomodel:pfc 200scope:eqversion:03.00.39\(12\)

Trust: 1.0

vendor:wagomodel:pfc 200scope:eqversion:03.01.07\(13\)

Trust: 1.0

vendor:pfc 200model: - scope:eqversion:03.00.39(12)

Trust: 0.2

vendor:pfc 200model: - scope:eqversion:03.01.07(13)

Trust: 0.2

vendor:pfc 100model: - scope:eqversion:03.00.39(12)

Trust: 0.2

sources: IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f // CNVD: CNVD-2019-46397 // JVNDB: JVNDB-2019-013744 // NVD: CVE-2019-5073

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5073
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-5073
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-46397
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201912-735
value: MEDIUM

Trust: 0.6

IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f
value: MEDIUM

Trust: 0.2

nvd@nist.gov: CVE-2019-5073
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-46397
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-5073
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2019-5073
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f // CNVD: CNVD-2019-46397 // JVNDB: JVNDB-2019-013744 // CNNVD: CNNVD-201912-735 // NVD: CVE-2019-5073

PROBLEMTYPE DATA

problemtype:CWE-200

Trust: 1.8

sources: JVNDB: JVNDB-2019-013744 // NVD: CVE-2019-5073

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-735

TYPE

information disclosure

Trust: 0.6

sources: CNNVD: CNNVD-201912-735

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013744

PATCH

title:Top Pageurl:https://www.wago.com/us/

Trust: 0.8

title:WAGO PFC 200 and WAGO PFC100 Repair measures for information disclosure vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106023

Trust: 0.6

sources: JVNDB: JVNDB-2019-013744 // CNNVD: CNNVD-201912-735

EXTERNAL IDS

db:NVDid:CVE-2019-5073

Trust: 3.2

db:TALOSid:TALOS-2019-0862

Trust: 3.0

db:CNVDid:CNVD-2019-46397

Trust: 0.8

db:CNNVDid:CNNVD-201912-735

Trust: 0.8

db:JVNDBid:JVNDB-2019-013744

Trust: 0.8

db:NSFOCUSid:47152

Trust: 0.6

db:AUSCERTid:ESB-2020.0842

Trust: 0.6

db:ICS CERTid:ICSA-20-065-01

Trust: 0.6

db:IVDid:32CFF3E1-62C7-4B0D-9C9D-F140EBBC5A6F

Trust: 0.2

sources: IVD: 32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f // CNVD: CNVD-2019-46397 // JVNDB: JVNDB-2019-013744 // CNNVD: CNNVD-201912-735 // NVD: CVE-2019-5073

REFERENCES

url:https://www.talosintelligence.com/vulnerability_reports/talos-2019-0862

Trust: 1.8

url:https://talosintelligence.com/vulnerability_reports/talos-2019-0862

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-5073

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5073

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-20-065-01

Trust: 0.6

url:http://www.nsfocus.net/vulndb/47152

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0842/

Trust: 0.6

sources: CNVD: CNVD-2019-46397 // JVNDB: JVNDB-2019-013744 // CNNVD: CNNVD-201912-735 // NVD: CVE-2019-5073

CREDITS

Discovered by Kelly Leuschner of Cisco Talos

Trust: 0.6

sources: CNNVD: CNNVD-201912-735

SOURCES

db:IVDid:32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6f
db:CNVDid:CNVD-2019-46397
db:JVNDBid:JVNDB-2019-013744
db:CNNVDid:CNNVD-201912-735
db:NVDid:CVE-2019-5073

LAST UPDATE DATE

2024-11-23T21:51:49.213000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-46397date:2019-12-20T00:00:00
db:JVNDBid:JVNDB-2019-013744date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-735date:2020-07-16T00:00:00
db:NVDid:CVE-2019-5073date:2024-11-21T04:44:17.933

SOURCES RELEASE DATE

db:IVDid:32cff3e1-62c7-4b0d-9c9d-f140ebbc5a6fdate:2019-12-20T00:00:00
db:CNVDid:CNVD-2019-46397date:2019-12-20T00:00:00
db:JVNDBid:JVNDB-2019-013744date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-735date:2019-12-16T00:00:00
db:NVDid:CVE-2019-5073date:2019-12-18T21:15:13.897