First published: Mon Jun 17 2019(Updated: )
WAGO 852-303 before FW06, 852-1305 before FW06, and 852-1505 before FW03 devices contain hardcoded users and passwords that can be used to login via SSH and TELNET.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO 852-303 | <1.2.2.s0 | |
Wago 852-303 Firmware | ||
Wago 852-1305 | <1.1.6.s0 | |
Wago 852-1305 Firmware | ||
Wago 852-1505 | <1.1.5.s0 | |
Wago 852-1505 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12550 has a high severity due to the presence of hardcoded credentials that can be exploited to gain unauthorized access.
To fix CVE-2019-12550, update your WAGO device firmware to the latest version that removes the hardcoded users and passwords.
CVE-2019-12550 affects WAGO 852-303, 852-1305, and 852-1505 devices before specific firmware versions.
Yes, CVE-2019-12550 can be exploited remotely via SSH and TELNET due to the hardcoded credentials.
The potential impacts include unauthorized access to the devices, leading to possible manipulation or disruption of operations.