CWE
306
Advisory Published
Updated

CVE-2020-12500: Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products

First published: Thu Oct 15 2020(Updated: )

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) allows unauthenticated device administration.

Credit: info@cert.vde.com

Affected SoftwareAffected VersionHow to fix
Pepperl-fuchs Es7510-xt Firmware
Pepperl-fuchs Es7510-xt
Pepperl-fuchs Es8509-xt Firmware
Pepperl-fuchs Es8509-xt
Pepperl-fuchs Es8510-xt Firmware
Pepperl-fuchs Es8510-xt
Pepperl-fuchs Es9528-xtv2 Firmware
Pepperl-fuchs Es9528-xtv2
Pepperl-fuchs Es7506 Firmware
Pepperl-fuchs Es7506
Pepperl-fuchs Es7510 Firmware
Pepperl-fuchs Es7510
Pepperl-fuchs Es7528 Firmware
Pepperl-fuchs Es7528
Pepperl-fuchs Es8508 Firmware
Pepperl-fuchs Es8508
Pepperl-fuchs Es8508f Firmware
Pepperl-fuchs Es8508f
Pepperl-fuchs Es8510 Firmware
Pepperl-fuchs Es8510
Pepperl-fuchs Es8510-xte Firmware
Pepperl-fuchs Es8510-xte
Pepperl-fuchs Es9528 Firmware
Pepperl-fuchs Es9528
Pepperl-fuchs Es9528-xt Firmware
Pepperl-fuchs Es9528-xt

Remedy

An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-12500?

    CVE-2020-12500 refers to an Improper Authorization vulnerability in Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) that allows unauthenticated device administration.

  • How severe is CVE-2020-12500?

    CVE-2020-12500 has a severity rating of 9.8 (Critical).

  • How does CVE-2020-12500 affect Pepperl+Fuchs devices?

    CVE-2020-12500 affects Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) by allowing unauthenticated device administration.

  • Is Pepperl+Fuchs ES7510-XT vulnerable to CVE-2020-12500?

    Pepperl+Fuchs ES7510-XT is vulnerable to CVE-2020-12500.

  • How can I fix CVE-2020-12500 on Pepperl+Fuchs devices?

    To fix CVE-2020-12500 on Pepperl+Fuchs devices, it is recommended to apply the latest firmware update provided by Pepperl+Fuchs.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203