ID

VAR-201912-0776


CVE

CVE-2019-5077


TITLE

WAGO PFC 200 and PFC100 Vulnerability related to lack of certification for critical functions in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2019-013792

DESCRIPTION

An exploitable denial-of-service vulnerability exists in the iocheckd service ‘’I/O-Chec’’ functionality of WAGO PFC 200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC 100 Firmware version 03.00.39(12). A specially crafted set of packets can cause a denial of service, resulting in the device entering an error state where it ceases all network communications. An attacker can send unauthenticated packets to trigger this vulnerability. WAGO PFC 200 and PFC100 Firmware is vulnerable to a lack of authentication for critical functions.Tampering with information and disrupting service operations (DoS) There is a possibility of being put into a state. WAGO PFC200 is a programmable logic controller (PLC) from the German company WAGO. WAGO PFC200 has an access control error vulnerability

Trust: 2.34

sources: NVD: CVE-2019-5077 // JVNDB: JVNDB-2019-013792 // CNVD: CNVD-2019-46396 // IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be

IOT TAXONOMY

category:['ICS', 'Network device']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.2

sources: IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be // CNVD: CNVD-2019-46396

AFFECTED PRODUCTS

vendor:wagomodel:pfc200scope:eqversion:03.01.07(13)

Trust: 1.4

vendor:wagomodel:pfc200scope:eqversion:03.00.39(12)

Trust: 1.4

vendor:wagomodel:pfc100scope:eqversion:03.00.39(12)

Trust: 1.4

vendor:wagomodel:pfc 100scope:eqversion:03.00.39\(12\)

Trust: 1.0

vendor:wagomodel:pfc 200scope:eqversion:03.00.39\(12\)

Trust: 1.0

vendor:wagomodel:pfc 200scope:eqversion:03.01.07\(13\)

Trust: 1.0

vendor:pfc 200model: - scope:eqversion:03.00.39(12)

Trust: 0.2

vendor:pfc 200model: - scope:eqversion:03.01.07(13)

Trust: 0.2

vendor:pfc 100model: - scope:eqversion:03.00.39(12)

Trust: 0.2

sources: IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be // CNVD: CNVD-2019-46396 // JVNDB: JVNDB-2019-013792 // NVD: CVE-2019-5077

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-5077
value: CRITICAL

Trust: 1.0

NVD: CVE-2019-5077
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2019-46396
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201912-737
value: CRITICAL

Trust: 0.6

IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2019-5077
severity: HIGH
baseScore: 8.5
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 7.8
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-46396
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be
severity: HIGH
baseScore: 9.4
vectorString: AV:N/AC:L/AU:N/C:N/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 9.2
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

nvd@nist.gov: CVE-2019-5077
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.2
version: 3.1

Trust: 1.0

NVD: CVE-2019-5077
baseSeverity: CRITICAL
baseScore: 9.1
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be // CNVD: CNVD-2019-46396 // JVNDB: JVNDB-2019-013792 // CNNVD: CNNVD-201912-737 // NVD: CVE-2019-5077

PROBLEMTYPE DATA

problemtype:CWE-306

Trust: 1.8

sources: JVNDB: JVNDB-2019-013792 // NVD: CVE-2019-5077

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201912-737

TYPE

Access control error

Trust: 0.8

sources: IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be // CNNVD: CNNVD-201912-737

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013792

PATCH

title:Top Pageurl:https://www.wago.com/us/

Trust: 0.8

sources: JVNDB: JVNDB-2019-013792

EXTERNAL IDS

db:NVDid:CVE-2019-5077

Trust: 3.2

db:TALOSid:TALOS-2019-0869

Trust: 3.0

db:CNVDid:CNVD-2019-46396

Trust: 0.8

db:CNNVDid:CNNVD-201912-737

Trust: 0.8

db:JVNDBid:JVNDB-2019-013792

Trust: 0.8

db:NSFOCUSid:47154

Trust: 0.6

db:AUSCERTid:ESB-2020.0842

Trust: 0.6

db:ICS CERTid:ICSA-20-065-01

Trust: 0.6

db:IVDid:FBCC5C8E-3D0E-4695-9BB3-6CEAE21897BE

Trust: 0.2

sources: IVD: fbcc5c8e-3d0e-4695-9bb3-6ceae21897be // CNVD: CNVD-2019-46396 // JVNDB: JVNDB-2019-013792 // CNNVD: CNNVD-201912-737 // NVD: CVE-2019-5077

REFERENCES

url:https://talosintelligence.com/vulnerability_reports/talos-2019-0869

Trust: 2.4

url:https://www.talosintelligence.com/vulnerability_reports/talos-2019-0869

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-5077

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-5077

Trust: 0.8

url:https://www.us-cert.gov/ics/advisories/icsa-20-065-01

Trust: 0.6

url:http://www.nsfocus.net/vulndb/47154

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.0842/

Trust: 0.6

sources: CNVD: CNVD-2019-46396 // JVNDB: JVNDB-2019-013792 // CNNVD: CNNVD-201912-737 // NVD: CVE-2019-5077

CREDITS

Discovered by Kelly Leuschner of Cisco Talos

Trust: 0.6

sources: CNNVD: CNNVD-201912-737

SOURCES

db:IVDid:fbcc5c8e-3d0e-4695-9bb3-6ceae21897be
db:CNVDid:CNVD-2019-46396
db:JVNDBid:JVNDB-2019-013792
db:CNNVDid:CNNVD-201912-737
db:NVDid:CVE-2019-5077

LAST UPDATE DATE

2024-11-23T21:51:49.121000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-46396date:2019-12-20T00:00:00
db:JVNDBid:JVNDB-2019-013792date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-737date:2020-07-16T00:00:00
db:NVDid:CVE-2019-5077date:2024-11-21T04:44:18.400

SOURCES RELEASE DATE

db:IVDid:fbcc5c8e-3d0e-4695-9bb3-6ceae21897bedate:2019-12-20T00:00:00
db:CNVDid:CNVD-2019-46396date:2019-12-20T00:00:00
db:JVNDBid:JVNDB-2019-013792date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-737date:2019-12-16T00:00:00
db:NVDid:CVE-2019-5077date:2019-12-18T20:15:16.837