CVE-2018-5459
Summary
| CVE | CVE-2018-5459 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-02-13 21:29:00 UTC |
| Updated | 2019-10-09 23:41:00 UTC |
| Description | An Improper Authentication issue was discovered in WAGO PFC200 Series 3S CoDeSys Runtime versions 2.3.X and 2.4.X. An attacker can execute different unauthenticated remote operations because of the CoDeSys Runtime application, which is available via network by default on Port 2455. An attacker could execute some unauthenticated commands such as reading, writing, or deleting arbitrary files, or manipulate the PLC application during runtime by sending specially-crafted TCP packets to Port 2455. |
Risk And Classification
Problem Types: CWE-287
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Wago | 750-8202 | - | All | All | All |
| Hardware | Wago | 750-8202 | - | All | All | All |
| Hardware | Wago | 750-8202/025-000 | - | All | All | All |
| Hardware | Wago | 750-8202/025-001 | - | All | All | All |
| Hardware | Wago | 750-8202/025-002 | - | All | All | All |
| Hardware | Wago | 750-8202/040-001 | - | All | All | All |
| Hardware | Wago | 750-8202/025-000 | - | All | All | All |
| Hardware | Wago | 750-8202/025-000 | - | All | All | All |
| Hardware | Wago | 750-8202/025-001 | - | All | All | All |
| Hardware | Wago | 750-8202/025-001 | - | All | All | All |
| Hardware | Wago | 750-8202/025-002 | - | All | All | All |
| Hardware | Wago | 750-8202/025-002 | - | All | All | All |
| Hardware | Wago | 750-8202/040-001 | - | All | All | All |
| Hardware | Wago | 750-8202/040-001 | - | All | All | All |
| Hardware | Wago | 750-8203 | - | All | All | All |
| Hardware | Wago | 750-8203 | - | All | All | All |
| Hardware | Wago | 750-8203/025-000 | - | All | All | All |
| Hardware | Wago | 750-8203/025-000 | - | All | All | All |
| Hardware | Wago | 750-8203/025-000 | - | All | All | All |
| Hardware | Wago | 750-8204 | - | All | All | All |
| Hardware | Wago | 750-8204 | - | All | All | All |
| Hardware | Wago | 750-8204/025-000 | - | All | All | All |
| Hardware | Wago | 750-8204/025-000 | - | All | All | All |
| Hardware | Wago | 750-8204/025-000 | - | All | All | All |
| Hardware | Wago | 750-8206 | - | All | All | All |
| Hardware | Wago | 750-8206 | - | All | All | All |
| Hardware | Wago | 750-8206/025-000 | - | All | All | All |
| Hardware | Wago | 750-8206/025-001 | - | All | All | All |
| Hardware | Wago | 750-8206/025-000 | - | All | All | All |
| Hardware | Wago | 750-8206/025-000 | - | All | All | All |
| Hardware | Wago | 750-8206/025-001 | - | All | All | All |
| Hardware | Wago | 750-8206/025-001 | - | All | All | All |
| Hardware | Wago | 750-8207 | - | All | All | All |
| Hardware | Wago | 750-8207 | - | All | All | All |
| Hardware | Wago | 750-8207/025-000 | - | All | All | All |
| Hardware | Wago | 750-8207/025-001 | - | All | All | All |
| Hardware | Wago | 750-8207/025-000 | - | All | All | All |
| Hardware | Wago | 750-8207/025-000 | - | All | All | All |
| Hardware | Wago | 750-8207/025-001 | - | All | All | All |
| Hardware | Wago | 750-8207/025-001 | - | All | All | All |
| Hardware | Wago | 750-8208 | - | All | All | All |
| Hardware | Wago | 750-8208 | - | All | All | All |
| Hardware | Wago | 750-8208/025-000 | - | All | All | All |
| Hardware | Wago | 750-8208/025-000 | - | All | All | All |
| Hardware | Wago | 750-8208/025-000 | - | All | All | All |
| Hardware | Wago | Pfc200 | - | All | All | All |
| Hardware | Wago | Pfc200 | - | All | All | All |
| Operating System | Wago | Pfc200 Firmware | All | All | All | All |
| Operating System | Wago | Pfc200 Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| WAGO PFC200 Series | CISA | MISC | ics-cert.us-cert.gov | Third Party Advisory, US Government Resource |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.