VDE-2019-017

Vulnerability from csaf_wagogmbhcokg - Published: 2019-09-18 11:25 - Updated: 2025-05-14 12:28
Summary
WAGO: Series PFC100/PFC200 Information Disclosure
Notes
Summary: The reported vulnerability allows a remote attacker to check paths and file names that are used in filesystem operations. **Update, 18.9.2019, 18:30** * fixed typo in modelname, replaced PCF with PFC.
Impact: The vulnerability allows an attacker to check the existence of files via specially crafted HTTP requests. This can be potentially used to identify installed software and leak of sensitive data (e.g. session data stored in the file system).
Mitigation: * Restrict network access to the web server. * Restrict network access to the device. * Do not directly connect the device to the internet.
Remediation: Update your device to the latest firmware (>= FW12).

Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.

CWE-610 - Externally Controlled Reference to a Resource in Another Sphere
Mitigation * Restrict network access to the web server. * Restrict network access to the device. * Do not directly connect the device to the internet.
Vendor Fix Update your device to the latest firmware (>= FW12).
Acknowledgments
CERT@VDE certvde.com
Nico Jansen (Fachhochschule Aachen)

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      },
      {
        "organization": "Nico Jansen (Fachhochschule Aachen)",
        "summary": "reporting"
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "The reported vulnerability allows a remote attacker to check paths and file names that are used in filesystem operations.\n\n**Update, 18.9.2019, 18:30**\n\n* fixed typo in modelname, replaced PCF with PFC.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "The vulnerability allows an attacker to check the existence of files via specially crafted HTTP requests. This can be potentially used to identify installed software and leak of sensitive data (e.g. session data stored in the file system).",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "* Restrict network access to the web server.\n* Restrict network access to the device.\n* Do not directly connect the device to the internet.",
        "title": "Mitigation"
      },
      {
        "category": "description",
        "text": "Update your device to the latest firmware (\u003e= FW12).\n\n",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "psirt@wago.com",
      "name": "WAGO GmbH \u0026 Co. KG",
      "namespace": "https://www.wago.com/psirt"
    },
    "references": [
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for WAGO",
        "url": "https://certvde.com/en/advisories/vendor/wago"
      },
      {
        "category": "self",
        "summary": "VDE-2019-017: WAGO: Series PFC100/PFC200 Information Disclosure - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2019-017"
      },
      {
        "category": "self",
        "summary": "VDE-2019-017: WAGO: Series PFC100/PFC200 Information Disclosure - CSAF",
        "url": "https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-017.json"
      }
    ],
    "title": "WAGO: Series PFC100/PFC200 Information Disclosure",
    "tracking": {
      "aliases": [
        "VDE-2019-017"
      ],
      "current_release_date": "2025-05-14T12:28:19.000Z",
      "generator": {
        "date": "2024-07-19T08:34:30.236Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.8"
        }
      },
      "id": "VDE-2019-017",
      "initial_release_date": "2019-09-18T11:25:00.000Z",
      "revision_history": [
        {
          "date": "2019-09-18T11:25:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        },
        {
          "date": "2019-09-18T16:30:00.000Z",
          "number": "2",
          "summary": "Fixed typo."
        },
        {
          "date": "2024-11-06T11:27:01.000Z",
          "number": "3",
          "summary": "Fix: correct certvde domain, added alias, added self-reference"
        },
        {
          "date": "2025-05-14T12:28:19.000Z",
          "number": "4",
          "summary": "Fix: version space, added distribution"
        }
      ],
      "status": "final",
      "version": "4"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_name",
                    "name": "750-81xx/xxx-xxx",
                    "product": {
                      "name": "PFC100 750-81xx/xxx-xxx",
                      "product_id": "CSAFPID-11001"
                    }
                  }
                ],
                "category": "product_family",
                "name": "PFC100"
              },
              {
                "branches": [
                  {
                    "category": "product_name",
                    "name": "750-82xx/xxx-xxx",
                    "product": {
                      "name": "PFC200 750-82xx/xxx-xxx",
                      "product_id": "CSAFPID-11002"
                    }
                  }
                ],
                "category": "product_family",
                "name": "PFC200"
              }
            ],
            "category": "product_family",
            "name": "Hardware"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003cFW12",
                "product": {
                  "name": "Firmware \u003cFW12",
                  "product_id": "CSAFPID-21001"
                }
              },
              {
                "category": "product_version",
                "name": "FW12",
                "product": {
                  "name": "Firmware FW12",
                  "product_id": "CSAFPID-22001"
                }
              }
            ],
            "category": "product_family",
            "name": "Firmware"
          }
        ],
        "category": "vendor",
        "name": "WAGO"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-31001",
          "CSAFPID-31002"
        ],
        "summary": "Affected products."
      },
      {
        "group_id": "CSAFGID-0002",
        "product_ids": [
          "CSAFPID-32001",
          "CSAFPID-32002"
        ],
        "summary": "Fixed products."
      }
    ],
    "relationships": [
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003cFW12 installed on PFC100 750-81xx/xxx-xxx",
          "product_id": "CSAFPID-31001"
        },
        "product_reference": "CSAFPID-21001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware \u003cFW12 installed on PFC200 750-82xx/xxx-xxx",
          "product_id": "CSAFPID-31002"
        },
        "product_reference": "CSAFPID-21001",
        "relates_to_product_reference": "CSAFPID-11002"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware FW12 installed on PFC100 750-81xx/xxx-xxx",
          "product_id": "CSAFPID-32001"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11001"
      },
      {
        "category": "installed_on",
        "full_product_name": {
          "name": "Firmware FW12 installed on PFC200 750-82xx/xxx-xxx",
          "product_id": "CSAFPID-32002"
        },
        "product_reference": "CSAFPID-22001",
        "relates_to_product_reference": "CSAFPID-11002"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-18202",
      "cwe": {
        "id": "CWE-610",
        "name": "Externally Controlled Reference to a Resource in Another Sphere"
      },
      "notes": [
        {
          "audience": "all",
          "category": "description",
          "text": "Information Disclosure is possible on WAGO Series PFC100 and PFC200 devices before FW12 due to improper access control. A remote attacker can check for the existence of paths and file names via crafted HTTP requests.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "fixed": [
          "CSAFPID-32001",
          "CSAFPID-32002"
        ],
        "known_affected": [
          "CSAFPID-31001",
          "CSAFPID-31002"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "* Restrict network access to the web server.\n* Restrict network access to the device.\n* Do not directly connect the device to the internet.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Update your device to the latest firmware (\u003e= FW12).",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "environmentalScore": 5.3,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 5.3,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-31001",
            "CSAFPID-31002"
          ]
        }
      ],
      "title": "CVE-2019-18202"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…