First published: Mon Jun 17 2019(Updated: )
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded private keys for the SSH daemon. The fingerprint of the SSH host key from the corresponding SSH daemon matches the embedded private key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO 852-303 | <1.2.2.s0 | |
Wago 852-303 Firmware | ||
Wago 852-1305 | <1.1.6.s0 | |
Wago 852-1305 Firmware | ||
Wago 852-1505 | <1.1.5.s0 | |
Wago 852-1505 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12549 has a severity rating indicating significant risk due to hardcoded private keys in affected WAGO devices.
To fix CVE-2019-12549, update the firmware of the affected WAGO devices to the latest version provided by the manufacturer.
CVE-2019-12549 affects WAGO 852-303, 852-1305, and 852-1505 devices with specific firmware versions prior to their respective updates.
The consequences of CVE-2019-12549 include potential unauthorized access through the SSH daemon due to the presence of hardcoded keys.
A temporary workaround for CVE-2019-12549 includes restricting network access to the affected devices until firmware updates can be applied.