First published: Wed Mar 11 2020(Updated: )
An exploitable stack buffer overflow vulnerability vulnerability exists in the iocheckd service ‘I/O-Check’ functionality of WAGO PFC 200 Firmware version 03.02.02(14). An attacker can send a specially crafted packet to trigger the parsing of this cache file. The destination buffer sp+0x440 is overflowed with the call to sprintf() for any ip values that are greater than 1024-len(‘/etc/config-tools/config_interfaces interface=X1 state=enabled ip-address=‘) in length. A ip value of length 0x3da will cause the service to crash.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
WAGO PFC200 | =03.02.02\(14\) | |
WAGO PFC 200 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-5180.
The affected software for this vulnerability is WAGO PFC 200 Firmware version 03.02.02(14).
CVE-2019-5180 has a severity score of 7.8 (High).
An attacker can exploit CVE-2019-5180 by sending a specially crafted packet to trigger the parsing of a cache file, causing a stack buffer overflow.
Yes, WAGO PFC200 Firmware version 03.02.02(14) is vulnerable to CVE-2019-5180.