First published: Thu Jan 14 2021(Updated: )
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
fdtCONTAINER | ||
fdtCONTAINER | ||
fdtCONTAINER | ||
fdtCONTAINER | ||
fdtCONTAINER | ||
M&M Software GmbH, a subsidiary of WAGO Kontakttechnik | ||
M&M Software GmbH | ||
M&M Software GmbH, a subsidiary of WAGO Kontakttechnik | ||
dtmINSPECTOR | ||
Emerson Rosemount Transmitter Interface Software | ||
Pactware | >=5.0<=5.0.5.31 | |
dtmINSPECTOR | ||
Wago Fdtcontainer Application | <4.5 | |
Wago Fdtcontainer Application | >=4.5.0<=4.5.20304 | |
Wago Fdtcontainer Application | >=4.6.0<=4.6.20304 | |
fdtCONTAINER | <3.5 | |
fdtCONTAINER | >=3.5.0<=3.5.20304 | |
fdtCONTAINER | >=3.6.0<=3.6.20304 | |
Weidmueller Wi Manager | <=2.5.1 | |
Pepperl-Fuchs IO-Link Master Firmware | <=1.5.48 | |
Pepperl-fuchs Io-link Master 4-eip Firmware | ||
Pepperl+Fuchs IO-Link Master 4-PNIO | ||
Pepperl+Fuchs IO-Link Master 8 EIP | ||
Pepperl+Fuchs IO-Link Master 8 EIP-L | ||
Pepperl+Fuchs IO-Link Master 8-PNIO | ||
Pepperl-Fuchs IO-Link Master 8-PNIO-L | ||
Pepperl+Fuchs IO-Link Master DR-8-EIP-P | ||
Pepperl+Fuchs IO-Link Master DR-8-EIP-P | ||
Pepperl-Fuchs IO-Link Master DR-8-EIP-T | ||
Pepperl-Fuchs IO-Link Master DR-8-PNIO | ||
Pepperl-Fuchs IO-Link Master DR-8-PNIO-P | ||
Pepperl-Fuchs IO-Link Master DR-8-PNIO-T Firmware |
M&M Software provides two updated fdtCONTAINER component trees (3.6.20304.x < 3.7 and >= 3.7) see advisory https://cert.vde.com/en-us/advisories/vde-2020-048 for details.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-12525.
The severity of CVE-2020-12525 is high with a CVSS score of 7.8.
M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x are affected by CVE-2020-12525.
There is no known fix or patch available for CVE-2020-12525 at this time. It is recommended to follow the guidance provided by the vendors and monitor for any updates.
You can find more information about CVE-2020-12525 on the official websites of VDE and US-CERT.