Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-12501: VDE-2020-040 | CERT@VDE

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) use undocumented accounts.

CVE
#csrf#vulnerability#web#linux#perl#auth

2020-10-05 14:00 (CEST) VDE-2020-040

Pepperl+Fuchs: Multiple Products prone to multiple vulnerabilities in Comtrol RocketLinux
Share: Email | Twitter

**

Published

**

2020-10-05 14:00 (CEST)

**

Last update

**

2020-10-05 14:00 (CEST)

Vendor(s)

Pepperl+Fuchs SE

Product(s)

Article No°

Product Name

Affected Version(s)

ES7506

all versions

ES7506

all versions

ES7510

all versions

ES7510-XT

all versions

ES7528

all versions

ES8508

all versions

ES8508F

all versions

ES8509-XT

all versions

ES8510

all versions

ES8510-XT

all versions

ES8510-XTE

all versions

ES9528/ES9528-XT

all versions

ES9528-XTv2

all versions

**

Summary

**

Several critical vulnerabilities within Firmware have been identified. Please consult the CVEs for details.

**

Vulnerabilities

**

Summary

Active TFTP-Service

Summary

Unauthenticated Device Administration

Weakness

Use of Hardcoded Credentials (CWE-798)

Summary

Undocumented Accounts

Weakness

Cross-Site Request Forgery (CSRF) (CWE-352)

Summary

Unauthenticated Device Administration

Weakness

Improper Input Validation (CWE-20)

Summary

Multiple Authenticated Command Injections

**

Impact

**

Pepperl+Fuchs analyzed and identified affected devices.
Remote attackers may exploit multiple vulnerabilities to get access to the device and
execute any program and tap information.

**

Solution

**

An external protective measure is required.

  1. Traffic from untrusted networks to the device should be blocked by a firewall. Especially
    traffic targeting the administration webpage.

  2. Administrator and user access should be protected by a secure password and only be
    available to a very limited group of people.

**

Reported by

**

Related news

Korenix JetPort 5601V3 Backdoor Account

Korenix JetPort 5601V3 with firmware version 1.0 suffers from having default backdoor accounts. The vendor will not address the issue as they claim the secret cannot be cracked in a reasonable amount of time.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907