Lucene search

K
cve[email protected]CVE-2019-5134
HistoryMar 11, 2020 - 10:27 p.m.

CVE-2019-5134

2020-03-1122:27:40
web.nvd.nist.gov
56
cve-2019-5134
exploitable
regular expression
vulnerability
wago pfc200
wago pfc100
authentication
information disclosure
nvd

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.2%

An exploitable regular expression without anchors vulnerability exists in the Web-Based Management (WBM) authentication functionality of WAGO PFC200 versions 03.00.39(12) and 03.01.07(13), and WAGO PFC100 version 03.00.39(12). A specially crafted authentication request can bypass regular expression filters, resulting in sensitive information disclosure.

Affected configurations

Vulners
NVD
Node
wagopfc200Rangeversion 03.00.39(12)
OR
wagopfc200Rangeversion 03.01.07(13)
OR
wagopfc100Rangeversion 03.00.39(12)
VendorProductVersionCPE
wagopfc200*cpe:2.3:h:wago:pfc200:*:*:*:*:*:*:*:*
wagopfc200*cpe:2.3:h:wago:pfc200:*:*:*:*:*:*:*:*
wagopfc100*cpe:2.3:h:wago:pfc100:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "WAGO PFC200 Firmware",
    "vendor": "Wago",
    "versions": [
      {
        "status": "affected",
        "version": "version 03.00.39(12)"
      },
      {
        "status": "affected",
        "version": "version 03.01.07(13)"
      }
    ]
  },
  {
    "product": "WAGO PFC100 Firmware",
    "vendor": "Wago",
    "versions": [
      {
        "status": "affected",
        "version": "version 03.00.39(12)"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.4 High

AI Score

Confidence

High

0.004 Low

EPSS

Percentile

74.2%

Related for CVE-2019-5134