CVE-2019-5158
WAGO e!COCKPIT vulnerability analysis and mitigation

Overview

A firmware downgrade vulnerability (CVE-2019-5158) was discovered in WAGO e!COCKPIT automation software v1.6.1.5. The vulnerability exists in the firmware update package functionality, where a specially crafted firmware update file can allow an attacker to install an older firmware version while misleading users about the version being installed (Talos Report).

Technical details

The vulnerability stems from improper input validation in the firmware update mechanism. The e!COCKPIT software uses wup (WAGO update package) files for firmware updates, which consist of a zip archive that can be optionally encrypted with ZipCrypto using hard-coded credentials. The package contains a control file (package-info.xml) that specifies firmware metadata including Revision and ReleaseIndex. The vulnerability has a CVSS v3.0 score of 8.6 (HIGH) with vector CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H (Talos Report).

Impact

An attacker could exploit this vulnerability by preparing a malicious wup file using hard-coded credentials to extract and repackage legitimate WAGO firmware with modified metadata. For example, while the wup file contains firmware version 12, the metadata could indicate version 15, leading users to believe they're installing a newer version. This could enable attackers to exploit known vulnerabilities in older firmware versions to gain unauthorized access to the device (Talos Report).

Mitigation and workarounds

The vulnerability was disclosed to the vendor on October 31, 2019, and the vendor acknowledged it and passed it to CERT@VDE for coordination. The disclosure deadline was extended following discussions with the vendor on January 28, 2020, leading to a public release on March 9, 2020 (Talos Report).

Additional resources


SourceThis report was generated using AI

Related WAGO e!COCKPIT vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2019-5159HIGH7.8
  • WAGO e!COCKPITWAGO e!COCKPIT
  • cpe:2.3:a:wago:e\!cockpit
NoYesMar 11, 2020
CVE-2019-5158HIGH7.8
  • WAGO e!COCKPITWAGO e!COCKPIT
  • cpe:2.3:a:wago:e\!cockpit
NoNoMar 11, 2020
CVE-2019-5107HIGH7.5
  • WAGO e!COCKPITWAGO e!COCKPIT
  • cpe:2.3:a:wago:e\!cockpit
NoYesMar 11, 2020
CVE-2019-5106MEDIUM5.5
  • WAGO e!COCKPITWAGO e!COCKPIT
  • cpe:2.3:a:wago:e\!cockpit
NoYesMar 11, 2020

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management