Project Subscriptions
| Vendors | Products |
|---|---|
|
Korenix
Subscribe
|
Jetnet 4510
Subscribe
Jetnet 4510 Firmware
Subscribe
Jetnet 4706
Subscribe
Jetnet 4706 Firmware
Subscribe
Jetnet 4706f
Subscribe
Jetnet 4706f Firmware
Subscribe
Jetnet 5010
Subscribe
Jetnet 5010 Firmware
Subscribe
Jetnet 5310
Subscribe
Jetnet 5310 Firmware
Subscribe
Jetnet 5428g-20sfp
Subscribe
Jetnet 5428g-20sfp Firmware
Subscribe
Jetnet 5810g
Subscribe
Jetnet 5810g Firmware
Subscribe
Jetnet 6095
Subscribe
Jetnet 6095 Firmware
Subscribe
|
|
Pepperl-fuchs
Subscribe
|
Es7506
Subscribe
Es7506 Firmware
Subscribe
Es7510
Subscribe
Es7510-xt
Subscribe
Es7510-xt Firmware
Subscribe
Es7510 Firmware
Subscribe
Es7528
Subscribe
Es7528 Firmware
Subscribe
Es8508
Subscribe
Es8508 Firmware
Subscribe
Es8508f
Subscribe
Es8508f Firmware
Subscribe
Es8509-xt
Subscribe
Es8509-xt Firmware
Subscribe
Es8510
Subscribe
Es8510-xt
Subscribe
Es8510-xt Firmware
Subscribe
Es8510-xte
Subscribe
Es8510-xte Firmware
Subscribe
Es8510 Firmware
Subscribe
Es9528
Subscribe
Es9528-xt
Subscribe
Es9528-xt Firmware
Subscribe
Es9528-xtv2
Subscribe
Es9528-xtv2 Firmware
Subscribe
Es9528 Firmware
Subscribe
Icrl-m-16rj45\/4cp-g-din
Subscribe
Icrl-m-16rj45\/4cp-g-din Firmware
Subscribe
Icrl-m-8rj45\/4sfp-g-din
Subscribe
Icrl-m-8rj45\/4sfp-g-din Firmware
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4804 | Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to unauthenticated device administration. |
Solution
An external protective measure is required. 1) Traffic from untrusted networks to the device should be blocked by a firewall. Especially traffic targeting the administration webpage. 2) Administrator and user access should be protected by a secure password and only be available to a very limited group of people.
Workaround
No workaround given by the vendor.
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T18:43:33.813Z
Reserved: 2020-04-30T00:00:00
Link: CVE-2020-12502
No data.
Status : Modified
Published: 2020-10-15T19:15:11.643
Modified: 2024-11-21T04:59:48.970
Link: CVE-2020-12502
No data.
OpenCVE Enrichment
No data.
EUVD