#VU47405 Improper Authorization in PEPPERL+FUCHS Hardware solutions


Published: 2020-10-07

Vulnerability identifier: #VU47405

Vulnerability risk: High

CVSSv3.1: 9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:U/RC:C]

CVE-ID: CVE-2020-12500

CWE-ID: CWE-285

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
RocketLinx ES7510-XT
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8509-XT
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8510-XT
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES9528-XTv2
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES7506
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES7510
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES7528
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8508
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8508F
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8510
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES8510-XTE
Hardware solutions / Routers & switches, VoIP, GSM, etc
RocketLinx ES9528/ES9528-XT
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: PEPPERL+FUCHS

Description

The vulnerability allows a remote attacker to bypass authorization checks.

The vulnerability exists due to the affected devices can be managed via a Windows client program called "Jet View". A remote user can send a specially crafted request and bypass access restrictions.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

RocketLinx ES7510-XT: 2.1b

RocketLinx ES8509-XT: 2.1a

RocketLinx ES8510-XT: 3.1a

RocketLinx ES9528-XTv2: 2.1a

RocketLinx ES7506: 2.1b

RocketLinx ES7510: 1.4

RocketLinx ES7528: All versions

RocketLinx ES8508: All versions

RocketLinx ES8508F: All versions

RocketLinx ES8510: 3.1a

RocketLinx ES8510-XTE: All versions

RocketLinx ES9528/ES9528-XT: All versions


External links
http://packetstormsecurity.com/files/download/159469/SA-20201005-0.txt
http://files.pepperl-fuchs.com/webcat/navi/productInfo/doct/tdoct6954__eng.pdf?v=20201005082419


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability