Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.

Project Subscriptions

Vendors Products
Korenix Subscribe
Jetnet 4510 Subscribe
Jetnet 4510 Firmware Subscribe
Jetnet 4706 Subscribe
Jetnet 4706 Firmware Subscribe
Jetnet 4706f Subscribe
Jetnet 4706f Firmware Subscribe
Jetnet 5010 Subscribe
Jetnet 5010 Firmware Subscribe
Jetnet 5310 Subscribe
Jetnet 5310 Firmware Subscribe
Jetnet 5428g-20sfp Subscribe
Jetnet 5428g-20sfp Firmware Subscribe
Jetnet 5810g Subscribe
Jetnet 5810g Firmware Subscribe
Jetnet 6095 Subscribe
Jetnet 6095 Firmware Subscribe
Jetwave 2212g Subscribe
Jetwave 2212g Firmware Subscribe
Jetwave 2212s Subscribe
Jetwave 2212s Firmware Subscribe
Jetwave 2212x Subscribe
Jetwave 2212x Firmware Subscribe
Jetwave 2311 Subscribe
Jetwave 2311 Firmware Subscribe
Jetwave 3220 Subscribe
Jetwave 3220 Firmware Subscribe
Pepperl-fuchs Subscribe
Es7506 Firmware Subscribe
Es7510-xt Subscribe
Es7510-xt Firmware Subscribe
Es7510 Firmware Subscribe
Es7528 Firmware Subscribe
Es8508 Firmware Subscribe
Es8508f Subscribe
Es8508f Firmware Subscribe
Es8509-xt Subscribe
Es8509-xt Firmware Subscribe
Es8510-xt Subscribe
Es8510-xt Firmware Subscribe
Es8510-xte Subscribe
Es8510-xte Firmware Subscribe
Es8510 Firmware Subscribe
Es9528-xt Subscribe
Es9528-xt Firmware Subscribe
Es9528-xtv2 Subscribe
Es9528-xtv2 Firmware Subscribe
Es9528 Firmware Subscribe
Icrl-m-16rj45\/4cp-g-din Subscribe
Icrl-m-16rj45\/4cp-g-din Firmware Subscribe
Icrl-m-8rj45\/4sfp-g-din Subscribe
Icrl-m-8rj45\/4sfp-g-din Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-4805 Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to multiple authenticated command injections.
Fixes

Solution

An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T04:24:41.310Z

Reserved: 2020-04-30T00:00:00

Link: CVE-2020-12503

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-15T19:15:11.753

Modified: 2024-11-21T04:59:49.137

Link: CVE-2020-12503

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses