Page 13 of 96 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 1

An exploitable command injection vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). An attacker can inject OS commands into the TimeoutUnconfirmed parameter value contained in the Firmware Update command. Existe una vulnerabilidad de inyección de comandos explotable en la funcionalidad Cloud Connectivity en WAGO PFC200 en las versiones de firmware 03.02.02(14), 03.01.07(13) y 03.00.39(12). Un atacante puede inyectar comandos de sistema operativo en el valor del parámetro TimeoutUnconfirmed contenido en el comando Firmware Update. • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0950 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

An exploitable firmware downgrade vulnerability exists in the firmware update package functionality of the WAGO e!COCKPIT automation software v1.6.1.5. A specially crafted firmware update file can allow an attacker to install an older firmware version while the user thinks a newer firmware version is being installed. An attacker can create a custom firmware update package with invalid metadata in order to trigger this vulnerability. Existe una vulnerabilidad de degradación de firmware explotable en la funcionalidad de paquete de actualización de firmware del software de automatización WAGO e! • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0951 • CWE-798: Use of Hard-coded Credentials •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An exploitable improper input validation vulnerability exists in the firmware update functionality of WAGO e!COCKPIT automation software v1.6.0.7. A specially crafted firmware update file can allow an attacker to write arbitrary files to arbitrary locations on WAGO controllers as a part of executing a firmware update, potentially resulting in code execution. An attacker can create a malicious firmware update package file using any zip utility. The user must initiate a firmware update through e! • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0952 • CWE-668: Exposure of Resource to Wrong Sphere •

CVSS: 9.1EPSS: 0%CPEs: 4EXPL: 1

An exploitable improper host validation vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 Firmware versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted HTTPS POST request can cause the software to connect to an unauthorized host, resulting in unauthorized access to firmware update functionality. An attacker can send an authenticated HTTPS POST request to direct the Cloud Connectivity software to connect to an attacker controlled Azure IoT Hub node. Existe una vulnerabilidad de comprobación de host inapropiada explotable en la funcionalidad Cloud Connectivity de WAGO PFC200 en las versiones de Firmware 03.02.02(14), 03.01.07(13) y 03.00.39(12). Una petición POST HTTPS especialmente diseñada puede causar que el software se conecte a un host no autorizado, resultando en un acceso no autorizado a la funcionalidad de actualización de firmware. • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0953 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An exploitable command injection vulnerability exists in the iocheckd service ‘I/O-Check’ function of the WAGO PFC 200 version 03.02.02(14). An attacker can send a specially crafted XML cache file At 0x1e8a8 the extracted domainname value from the xml file is used as an argument to /etc/config-tools/edit_dns_server domain-name=<contents of domainname node> using sprintf().This command is later executed via a call to system(). Se presenta una vulnerabilidad de inyección de comando explotable en la función "I/O-Check" del servicio iocheckd de WAGO PFC 200 versión 03.02.02(14). Un atacante puede enviar un archivo cache XML especialmente diseñado. En 0x1e8a8, el valor de nombre de dominio extraído del archivo xml es usado como argumento para /etc/config-tools/edit_dns_server domain-name=(contents of domainname node) usando la función sprintf(). • https://talosintelligence.com/vulnerability_reports/TALOS-2019-0962 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •