Wago PFC200 Cloud Connectivity Remote Code Execution (CVE-2019-5161)

critical Tenable OT Security Plugin ID 500825


The remote OT asset is affected by a vulnerability.


An exploitable remote code execution vulnerability exists in the Cloud Connectivity functionality of WAGO PFC200 versions 03.02.02(14), 03.01.07(13), and 03.00.39(12). A specially crafted XML file will direct the Cloud Connectivity service to download and execute a shell script with root privileges.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.


Refer to the vendor advisory.

See Also


Plugin Details

Severity: Critical

ID: 500825

Version: 1.2

Type: remote

Family: Tenable.ot

Published: 2/14/2023

Updated: 9/4/2023

Supported Sensors: Tenable OT Security

Risk Information


Risk Factor: High

Score: 7.3


Risk Factor: High

Base Score: 9

Temporal Score: 7

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-5161


Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:wago:pfc200_firmware:03.00.39%2812%29, cpe:/o:wago:pfc200_firmware:03.01.07%2813%29, cpe:/o:wago:pfc200_firmware:03.02.02%2814%29

Required KB Items: Tenable.ot/Wago

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/11/2020

Vulnerability Publication Date: 3/11/2020

Reference Information

CVE: CVE-2019-5161

CWE: 345