First published: Tue Mar 10 2020(Updated: )
A hard-coded encryption key vulnerability exists in the authentication functionality of WAGO e!Cockpit version 1.5.1.1. An attacker with access to communications between e!Cockpit and CoDeSyS Gateway can trivially recover the password of any user attempting to log in, in plain text.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wago E!cockpit | =1.5.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5106 is considered a critical vulnerability due to the ease with which the hard-coded encryption key can be exploited to expose user passwords.
To mitigate CVE-2019-5106, update WAGO e!Cockpit to a version where the hard-coded encryption key issue has been addressed.
The risks include unauthorized access to user accounts and potential control over devices that rely on WAGO e!Cockpit for operations.
Organizations using WAGO e!Cockpit version 1.5.1.1 are affected by CVE-2019-5106 due to the vulnerability in the authentication process.
Yes, CVE-2019-5106 can potentially be exploited remotely if an attacker has access to communications between e!Cockpit and CoDeSyS Gateway.