Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.01467.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Korenix
Subscribe
|
Jetwave 2212g
Subscribe
Jetwave 2212g Firmware
Subscribe
Jetwave 2212s
Subscribe
Jetwave 2212s Firmware
Subscribe
Jetwave 2212x
Subscribe
Jetwave 2212x Firmware
Subscribe
Jetwave 2311
Subscribe
Jetwave 2311 Firmware
Subscribe
Jetwave 3220
Subscribe
Jetwave 3220 Firmware
Subscribe
Jetwave 3420
Subscribe
Jetwave 3420 Firmware
Subscribe
Jetwave 4510
Subscribe
Jetwave 4510 Firmware
Subscribe
Jetwave 4706
Subscribe
Jetwave 4706 Firmware
Subscribe
Jetwave 4706f
Subscribe
Jetwave 4706f Firmware
Subscribe
Jetwave 5010
Subscribe
Jetwave 5010 Firmware
Subscribe
Jetwave 5310
Subscribe
Jetwave 5310 Firmware
Subscribe
Jetwave 5428g-20sfp
Subscribe
Jetwave 5428g-20sfp Firmware
Subscribe
Jetwave 5810g
Subscribe
Jetwave 5810g Firmware
Subscribe
|
|
Pepperl-fuchs
Subscribe
|
Es7506
Subscribe
Es7506 Firmware
Subscribe
Es7510
Subscribe
Es7510-xt
Subscribe
Es7510-xt Firmware
Subscribe
Es7510 Firmware
Subscribe
Es7528
Subscribe
Es7528 Firmware
Subscribe
Es8508
Subscribe
Es8508 Firmware
Subscribe
Es8508f
Subscribe
Es8508f Firmware
Subscribe
Es8509-xt
Subscribe
Es8509-xt Firmware
Subscribe
Es8510
Subscribe
Es8510-xt
Subscribe
Es8510-xt Firmware
Subscribe
Es8510-xte
Subscribe
Es8510-xte Firmware
Subscribe
Es8510 Firmware
Subscribe
Es9528
Subscribe
Es9528-xt
Subscribe
Es9528-xt Firmware
Subscribe
Es9528-xtv2
Subscribe
Es9528-xtv2 Firmware
Subscribe
Es9528 Firmware
Subscribe
Icrl-m-16rj45\/4cp-g-din
Subscribe
Icrl-m-16rj45\/4cp-g-din Firmware
Subscribe
Icrl-m-8rj45\/4sfp-g-din
Subscribe
Icrl-m-8rj45\/4sfp-g-din Firmware
Subscribe
|
|
Westermo
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4806 | Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below has an active TFTP-Service. |
Solution
For ICRL-M-8RJ45/4SFP-G-DIN and ICRL-M-16RJ45/4CP-G-DIN: Update to Firmware 1.3.1 and deactivate TFTP-Service. For all other devices: An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T17:09:09.147Z
Reserved: 2020-04-30T00:00:00
Link: CVE-2020-12504
No data.
Status : Modified
Published: 2020-10-15T19:15:11.993
Modified: 2024-11-21T04:59:49.320
Link: CVE-2020-12504
No data.
OpenCVE Enrichment
No data.
EUVD