First published: Tue Mar 10 2020(Updated: )
An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system().
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO PFC200 Firmware | =03.02.02\(14\) | |
WAGO PFC200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5168 is a command injection vulnerability in the iocheckd service 'I/O-Check' function of the WAGO PFC 200 version 03.02.02(14).
CVE-2019-5168 has a severity rating of 7.8, which is considered high.
The WAGO PFC 200 firmware version 03.02.02(14) is affected by CVE-2019-5168.
To fix CVE-2019-5168, you should update the WAGO PFC 200 firmware to a version that is not vulnerable.
You can find more information about CVE-2019-5168 at this link: https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962