First published: Tue Mar 10 2020(Updated: )
An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wago E!cockpit | =1.6.1.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5158 is considered a high severity vulnerability due to its potential impact on firmware integrity.
To mitigate CVE-2019-5158, users should update to the latest version of WAGO e!COCKPIT that addresses this vulnerability.
CVE-2019-5158 enables attackers to perform a firmware downgrade attack by exploiting the firmware update package functionality.
CVE-2019-5158 specifically affects WAGO e!COCKPIT version 1.6.1.5.
Users should be aware that CVE-2019-5158 can lead to unauthorized downgrading of the firmware, compromising system security.