CWE
798
Advisory Published
Updated

CVE-2020-12501: Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products

First published: Thu Oct 15 2020(Updated: )

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) use undocumented accounts.

Credit: info@cert.vde.com info@cert.vde.com

Affected SoftwareAffected VersionHow to fix
All of
Pepperl-fuchs Es7510-xt Firmware
Pepperl-fuchs Es7510-xt
All of
Pepperl-fuchs Es8509-xt Firmware
Pepperl-fuchs Es8509-xt
All of
Pepperl-fuchs Es8510-xt Firmware
Pepperl-fuchs Es8510-xt
All of
Pepperl-fuchs Es9528-xtv2 Firmware
Pepperl-fuchs Es9528-xtv2
All of
Pepperl-fuchs Es7506 Firmware
Pepperl-fuchs Es7506
All of
Pepperl-fuchs Es7510 Firmware
Pepperl-fuchs Es7510
All of
Pepperl-fuchs Es7528 Firmware
Pepperl-fuchs Es7528
All of
Pepperl-fuchs Es8508 Firmware
Pepperl-fuchs Es8508
All of
Pepperl-fuchs Es8508f Firmware
Pepperl-fuchs Es8508f
All of
Pepperl-fuchs Es8510 Firmware
Pepperl-fuchs Es8510
All of
Pepperl-fuchs Es8510-xte Firmware
Pepperl-fuchs Es8510-xte
All of
Pepperl-fuchs Es9528 Firmware
Pepperl-fuchs Es9528
All of
Pepperl-fuchs Es9528-xt Firmware
Pepperl-fuchs Es9528-xt
All of
Korenix Jetnet5428g-20sfp Firmware
Korenix Jetnet 5428g-20sfp
All of
Korenix Jetnet5810g Firmware
Korenix Jetnet 5810g
All of
Korenix Jetnet4510 Firmware
Korenix Jetnet 4510
All of
Korenix Jetnet5010 Firmware
Korenix Jetnet 5010
All of
Korenix Jetnet5310 Firmware
Korenix Jetnet 5310
All of
Korenix Jetnet6095 Firmware
Korenix Jetnet 6095
All of
Korenix Jetnet4706 Firmware
Korenix Jetnet 4706
All of
Korenix Jetwave 3220 Firmware
Korenix Jetwave 3220
All of
Korenix Jetwave 2311 Firmware
Korenix Jetwave 2311
All of
Korenix Jetnet4706f Firmware
Korenix Jetnet 4706f
All of
Korenix Jetwave 2212s Firmware
Korenix Jetwave 2212s
All of
Korenix Jetwave 2212g Firmware
Korenix Jetwave 2212g
All of
Korenix Jetwave 2212x Firmware
Korenix Jetwave 2212x
Pepperl-fuchs Es7510-xt Firmware
Pepperl-fuchs Es7510-xt
Pepperl-fuchs Es8509-xt Firmware
Pepperl-fuchs Es8509-xt
Pepperl-fuchs Es8510-xt Firmware
Pepperl-fuchs Es8510-xt
Pepperl-fuchs Es9528-xtv2 Firmware
Pepperl-fuchs Es9528-xtv2
Pepperl-fuchs Es7506 Firmware
Pepperl-fuchs Es7506
Pepperl-fuchs Es7510 Firmware
Pepperl-fuchs Es7510
Pepperl-fuchs Es7528 Firmware
Pepperl-fuchs Es7528
Pepperl-fuchs Es8508 Firmware
Pepperl-fuchs Es8508
Pepperl-fuchs Es8508f Firmware
Pepperl-fuchs Es8508f
Pepperl-fuchs Es8510 Firmware
Pepperl-fuchs Es8510
Pepperl-fuchs Es8510-xte Firmware
Pepperl-fuchs Es8510-xte
Pepperl-fuchs Es9528 Firmware
Pepperl-fuchs Es9528
Pepperl-fuchs Es9528-xt Firmware
Pepperl-fuchs Es9528-xt
Korenix Jetnet5428g-20sfp Firmware
Korenix Jetnet5428g-20sfp
Korenix Jetnet5810g Firmware
Korenix Jetnet5810g
Korenix Jetnet4510 Firmware
Korenix Jetnet4510
Korenix Jetnet5010 Firmware
Korenix Jetnet5010
Korenix Jetnet5310 Firmware
Korenix Jetnet5310
Korenix Jetnet6095 Firmware
Korenix Jetnet6095
Korenix Jetnet4706 Firmware
Korenix Jetnet4706
Korenix Jetwave 3220 Firmware
Korenix Jetwave 3220
Korenix Jetwave 2311 Firmware
Korenix Jetwave 2311
Korenix Jetnet4706f Firmware
Korenix Jetnet4706f
Korenix Jetwave 2212s Firmware
Korenix Jetwave 2212s
Korenix Jetwave 2212g Firmware
Korenix Jetwave 2212g
Korenix Jetwave 2212x Firmware
Korenix Jetwave 2212x

Remedy

An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this security issue?

    The vulnerability ID for this security issue is CVE-2020-12501.

  • What is the severity of CVE-2020-12501?

    The severity of CVE-2020-12501 is critical with a CVSS score of 9.8.

  • Which products are affected by CVE-2020-12501?

    The Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, and ES9528/ES9528-XT (all versions) are affected by CVE-2020-12501.

  • What is the vulnerability in Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, and ES9528/ES9528-XT?

    The vulnerability in Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, and ES9528/ES9528-XT is an improper authorization issue that allows the use of undocumented accounts.

  • How can I fix the issue related to CVE-2020-12501?

    To fix the issue related to CVE-2020-12501, it is recommended to apply the latest firmware update provided by Pepperl+Fuchs for the affected products.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203