9.8

CVE-2020-12504

Exploit

Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below has an active TFTP-Service.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Pepperl-fuchsEs7510-xt Firmware Version < 2.1.1
   Pepperl-fuchsEs7510-xt Version-
Pepperl-fuchsEs8510 Firmware Version < 3.1.1
   Pepperl-fuchsEs8510 Version-
KorenixJetwave 2212s Firmware Version1.5
   KorenixJetwave 2212s Version-
KorenixJetwave 2212g Firmware Version1.4
   KorenixJetwave 2212g Version-
KorenixJetwave 2311 Firmware Version1.2
   KorenixJetwave 2311 Version-
KorenixJetwave 3220 Firmware Version1.2
   KorenixJetwave 3220 Version-
KorenixJetwave 3420 Firmware Version1.1.3t
   KorenixJetwave 3420 Version-
KorenixJetwave 2212x Firmware Version1.5
   KorenixJetwave 2212x Version-
KorenixJetwave 5810g Firmware Version1.1
   KorenixJetwave 5810g Version-
KorenixJetwave 5310 Firmware Version1.5
   KorenixJetwave 5310 Version-
KorenixJetwave 5010 Firmware Version3.1a
   KorenixJetwave 5010 Version-
KorenixJetwave 4706f Firmware Version2.3b
   KorenixJetwave 4706f Version-
KorenixJetwave 4706 Firmware Version2.3b
   KorenixJetwave 4706 Version-
KorenixJetwave 4510 Firmware Version3.0b
   KorenixJetwave 4510 Version-
WestermoPmi-110-f2g Firmware Version1.5
   WestermoPmi-110-f2g Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.47% 0.791
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
info@cert.vde.com 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE-912 Hidden Functionality

The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators.