First published: Thu Oct 15 2020(Updated: )
Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) use undocumented accounts.
Credit: info@cert.vde.com info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Pepperl-fuchs Es7510-xt Firmware | ||
Pepperl-fuchs Es7510-xt | ||
All of | ||
Pepperl-fuchs Es8509-xt Firmware | ||
Pepperl-fuchs Es8509-xt | ||
All of | ||
Pepperl-fuchs Es8510-xt Firmware | ||
Pepperl-fuchs Es8510-xt | ||
All of | ||
Pepperl-fuchs Es9528-xtv2 Firmware | ||
Pepperl-fuchs Es9528-xtv2 | ||
All of | ||
Pepperl-fuchs Es7506 Firmware | ||
Pepperl-fuchs Es7506 | ||
All of | ||
Pepperl-fuchs Es7510 Firmware | ||
Pepperl-fuchs Es7510 | ||
All of | ||
Pepperl-fuchs Es7528 Firmware | ||
Pepperl-fuchs Es7528 | ||
All of | ||
Pepperl-fuchs Es8508 Firmware | ||
Pepperl-fuchs Es8508 | ||
All of | ||
Pepperl-fuchs Es8508f Firmware | ||
Pepperl-fuchs Es8508f | ||
All of | ||
Pepperl-fuchs Es8510 Firmware | ||
Pepperl-fuchs Es8510 | ||
All of | ||
Pepperl-fuchs Es8510-xte Firmware | ||
Pepperl-fuchs Es8510-xte | ||
All of | ||
Pepperl-fuchs Es9528 Firmware | ||
Pepperl-fuchs Es9528 | ||
All of | ||
Pepperl-fuchs Es9528-xt Firmware | ||
Pepperl-fuchs Es9528-xt | ||
All of | ||
Korenix Jetnet5428g-20sfp Firmware | ||
Korenix Jetnet 5428g-20sfp | ||
All of | ||
Korenix Jetnet5810g Firmware | ||
Korenix Jetnet 5810g | ||
All of | ||
Korenix Jetnet4510 Firmware | ||
Korenix Jetnet 4510 | ||
All of | ||
Korenix Jetnet5010 Firmware | ||
Korenix Jetnet 5010 | ||
All of | ||
Korenix Jetnet5310 Firmware | ||
Korenix Jetnet 5310 | ||
All of | ||
Korenix Jetnet6095 Firmware | ||
Korenix Jetnet 6095 | ||
All of | ||
Korenix Jetnet4706 Firmware | ||
Korenix Jetnet 4706 | ||
All of | ||
Korenix Jetwave 3220 Firmware | ||
Korenix Jetwave 3220 | ||
All of | ||
Korenix Jetwave 2311 Firmware | ||
Korenix Jetwave 2311 | ||
All of | ||
Korenix Jetnet4706f Firmware | ||
Korenix Jetnet 4706f | ||
All of | ||
Korenix Jetwave 2212s Firmware | ||
Korenix Jetwave 2212s | ||
All of | ||
Korenix Jetwave 2212g Firmware | ||
Korenix Jetwave 2212g | ||
All of | ||
Korenix Jetwave 2212x Firmware | ||
Korenix Jetwave 2212x | ||
Pepperl-fuchs Es7510-xt Firmware | ||
Pepperl-fuchs Es7510-xt | ||
Pepperl-fuchs Es8509-xt Firmware | ||
Pepperl-fuchs Es8509-xt | ||
Pepperl-fuchs Es8510-xt Firmware | ||
Pepperl-fuchs Es8510-xt | ||
Pepperl-fuchs Es9528-xtv2 Firmware | ||
Pepperl-fuchs Es9528-xtv2 | ||
Pepperl-fuchs Es7506 Firmware | ||
Pepperl-fuchs Es7506 | ||
Pepperl-fuchs Es7510 Firmware | ||
Pepperl-fuchs Es7510 | ||
Pepperl-fuchs Es7528 Firmware | ||
Pepperl-fuchs Es7528 | ||
Pepperl-fuchs Es8508 Firmware | ||
Pepperl-fuchs Es8508 | ||
Pepperl-fuchs Es8508f Firmware | ||
Pepperl-fuchs Es8508f | ||
Pepperl-fuchs Es8510 Firmware | ||
Pepperl-fuchs Es8510 | ||
Pepperl-fuchs Es8510-xte Firmware | ||
Pepperl-fuchs Es8510-xte | ||
Pepperl-fuchs Es9528 Firmware | ||
Pepperl-fuchs Es9528 | ||
Pepperl-fuchs Es9528-xt Firmware | ||
Pepperl-fuchs Es9528-xt | ||
Korenix Jetnet5428g-20sfp Firmware | ||
Korenix Jetnet5428g-20sfp | ||
Korenix Jetnet5810g Firmware | ||
Korenix Jetnet5810g | ||
Korenix Jetnet4510 Firmware | ||
Korenix Jetnet4510 | ||
Korenix Jetnet5010 Firmware | ||
Korenix Jetnet5010 | ||
Korenix Jetnet5310 Firmware | ||
Korenix Jetnet5310 | ||
Korenix Jetnet6095 Firmware | ||
Korenix Jetnet6095 | ||
Korenix Jetnet4706 Firmware | ||
Korenix Jetnet4706 | ||
Korenix Jetwave 3220 Firmware | ||
Korenix Jetwave 3220 | ||
Korenix Jetwave 2311 Firmware | ||
Korenix Jetwave 2311 | ||
Korenix Jetnet4706f Firmware | ||
Korenix Jetnet4706f | ||
Korenix Jetwave 2212s Firmware | ||
Korenix Jetwave 2212s | ||
Korenix Jetwave 2212g Firmware | ||
Korenix Jetwave 2212g | ||
Korenix Jetwave 2212x Firmware | ||
Korenix Jetwave 2212x |
An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security issue is CVE-2020-12501.
The severity of CVE-2020-12501 is critical with a CVSS score of 9.8.
The Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, and ES9528/ES9528-XT (all versions) are affected by CVE-2020-12501.
The vulnerability in Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, and ES9528/ES9528-XT is an improper authorization issue that allows the use of undocumented accounts.
To fix the issue related to CVE-2020-12501, it is recommended to apply the latest firmware update provided by Pepperl+Fuchs for the affected products.