cvelist/2019/5xxx/CVE-2019-5156.json

68 lines
2.3 KiB
JSON
Raw Normal View History

2019-01-04 09:04:41 -05:00
{
2020-03-11 00:01:17 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
2019-03-18 01:59:06 +00:00
"CVE_data_meta": {
"ID": "CVE-2019-5156",
2020-03-11 00:01:17 +00:00
"ASSIGNER": "talos-cna@cisco.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Wago",
"product": {
"product_data": [
{
"product_name": "WAGO PFC200 Firmware",
"version": {
"version_data": [
{
"version_value": "version 03.02.02(14)"
},
{
"version_value": "version 03.01.07(13)"
},
{
"version_value": "version 03.00.39(12)"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "command injection"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949",
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2019-0949"
}
]
2019-03-18 01:59:06 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-11 00:01:17 +00:00
"value": "An exploitable command injection vulnerability exists in the cloud connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject operating system commands into the TimeoutPrepared parameter value contained in the firmware update command."
2019-03-18 01:59:06 +00:00
}
]
}
}