{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T10:49:26.334","vulnerabilities":[{"cve":{"id":"CVE-2020-12502","sourceIdentifier":"info@cert.vde.com","published":"2020-10-15T19:15:11.643","lastModified":"2024-11-21T04:59:48.970","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Improper Authorization vulnerability of Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528/ES9528-XT (all versions) and ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW 1.2.3 and below is prone to unauthenticated device administration."},{"lang":"es","value":"Una vulnerabilidad de Autorización Inapropiada de Pepperl+Fuchs P+F Comtrol RocketLinx ES7510-XT, ES8509-XT, ES8510-XT, ES9528-XTv2, ES7506, ES7510, ES7528, ES8508, ES8508F, ES8510, ES8510-XTE, ES9528-XT (todas las versiones) e ICRL-M-8RJ45/4SFP-G-DIN, ICRL-M-16RJ45/4CP-G-DIN FW versiones 1.2.3 y por debajo, son propensos a una administración de dispositivos no autenticados"}],"metrics":{"cvssMetricV31":[{"source":"info@cert.vde.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"info@cert.vde.com","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-352"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es7510-xt_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"69279E51-1B3D-40F1-BC05-E7DE4FCF81D0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es7510-xt:-:*:*:*:*:*:*:*","matchCriteriaId":"E3FA814F-1C0E-4400-AA54-62520BD62F49"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8509-xt_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"235B73CF-E9EE-46BC-A89F-A27EC816420F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8509-xt:-:*:*:*:*:*:*:*","matchCriteriaId":"663998ED-61CC-40CE-A580-4D40E28FA5DB"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8510-xt_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"EEE2FFF7-9BEC-4456-9659-F1BC3E72508C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8510-xt:-:*:*:*:*:*:*:*","matchCriteriaId":"CF4AB5DA-CFEB-4F15-948D-1B5E08ADB370"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es9528-xtv2_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"8DFE9808-FA4D-4D8D-836D-7896ABD4DB6F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es9528-xtv2:-:*:*:*:*:*:*:*","matchCriteriaId":"B1B6AD07-2B10-4B56-A08E-D9DBF98FF06E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es7506_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"0BAB2AE4-E231-4485-89D3-4B153E7DFA60"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es7506:-:*:*:*:*:*:*:*","matchCriteriaId":"7CA6817C-7F79-42D9-BD4A-87B9278EE005"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es7510_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"9A81A766-C11C-4F1F-8D6D-66DA1067D04A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es7510:-:*:*:*:*:*:*:*","matchCriteriaId":"F5AC80E6-5276-4209-8C11-889A88547934"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es7528_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"08F78AC1-DD60-4035-A573-1FBC94BC2CFB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es7528:-:*:*:*:*:*:*:*","matchCriteriaId":"B0EF18AA-0305-48E6-BA3E-0921AAFAD21A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8508_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"F83E1070-A455-46A2-B677-1C55B78A872A"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8508:-:*:*:*:*:*:*:*","matchCriteriaId":"35D1152B-2CC1-47CB-967C-450E54AA0AC2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8508f_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"679D27C7-C1AD-4B5F-9EF6-8559EDC48190"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8508f:-:*:*:*:*:*:*:*","matchCriteriaId":"E2AB75DB-57CA-49C5-86AB-75D766F23D24"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8510_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"44ECCFCA-EE3D-4E66-BFB9-D5DC2CBBCB69"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8510:-:*:*:*:*:*:*:*","matchCriteriaId":"8C58A4C3-2DD2-4B24-8C16-806041276486"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es8510-xte_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"EB4475C9-C8B6-4BE7-9DEC-4E3BD3616711"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es8510-xte:-:*:*:*:*:*:*:*","matchCriteriaId":"89EB4DB0-519A-47DD-B1A5-AD50071DD045"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es9528_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"F8B014C8-A75E-4A84-BB99-183CC44EB090"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es9528:-:*:*:*:*:*:*:*","matchCriteriaId":"5942FAF3-99D9-421A-92E3-5CA16A5B3E5F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:es9528-xt_firmware:*:*:*:*:*:*:*:*","matchCriteriaId":"EF77744F-88F7-44E9-AA5C-7D0F0B664FAC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:es9528-xt:-:*:*:*:*:*:*:*","matchCriteriaId":"F3F2C76E-3724-4626-B25E-EBCF5FE74C90"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:icrl-m-8rj45\\/4sfp-g-din_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.3","matchCriteriaId":"1B5520C5-3AA7-42CD-87E5-7B19DEF1D724"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:icrl-m-8rj45\\/4sfp-g-din:-:*:*:*:*:*:*:*","matchCriteriaId":"49D839E1-3306-4211-A168-C5C2A8B5A40C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:icrl-m-16rj45\\/4cp-g-din_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.3","matchCriteriaId":"FB335DAA-18BB-4358-B9EF-3EC46214A292"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:icrl-m-16rj45\\/4cp-g-din:-:*:*:*:*:*:*:*","matchCriteriaId":"376BBE27-BC5B-4A8A-9DF6-C9982A797953"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_5428g-20sfp_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"327FC8D6-E59D-4DC5-918B-0AEBB07B2075"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_5428g-20sfp:-:*:*:*:*:*:*:*","matchCriteriaId":"41A504D7-8B61-4D78-9D66-9687D6110F47"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_5810g_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AD9A573B-3C73-4212-A562-C912EDF0C881"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_5810g:-:*:*:*:*:*:*:*","matchCriteriaId":"6C6C2282-D4E5-40FC-9C1A-749C1B1C623A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_4706f_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"83D1F86D-261B-490C-A4A3-EAAA5DB2B8E7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_4706f:-:*:*:*:*:*:*:*","matchCriteriaId":"875F22D5-57B9-43EB-A92C-9FB0EA948164"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_4706_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"AF01FC6A-9196-4B41-ACB1-46FC2EAD9A92"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_4706:-:*:*:*:*:*:*:*","matchCriteriaId":"DD089EE1-3D71-430C-9CA9-BE32470BEE27"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_4510_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4AF6BE33-3CC3-4488-AF8E-6A5096F15C9D"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_4510:-:*:*:*:*:*:*:*","matchCriteriaId":"C864A6A1-5E58-4EFE-85FC-DEDFBBC36473"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_5010_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"4F6BC0FF-63A0-4ADD-BD3A-F6DD1DB61356"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_5010:-:*:*:*:*:*:*:*","matchCriteriaId":"0896AC09-3022-4A14-93DB-D6BE6795C615"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_5310_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"37A42256-647A-4637-B05F-A9D70838A281"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_5310:-:*:*:*:*:*:*:*","matchCriteriaId":"86BE9095-B0A6-4268-AC78-453C462FB80B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:korenix:jetnet_6095_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"3BDA9563-F33F-4CC8-96F8-4B9954738A05"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:korenix:jetnet_6095:-:*:*:*:*:*:*:*","matchCriteriaId":"E5E6FE6C-873E-4C58-B590-3888BCE38F1D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:icrl-m-8rj45\\/4sfp-g-din_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4","matchCriteriaId":"5389E374-F055-4EC7-B31B-9DBD3D1B2A30"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:icrl-m-8rj45\\/4sfp-g-din:-:*:*:*:*:*:*:*","matchCriteriaId":"49D839E1-3306-4211-A168-C5C2A8B5A40C"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:pepperl-fuchs:icrl-m-16rj45\\/4cp-g-din_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.0","matchCriteriaId":"FDCC2EF5-2277-44F6-BEAC-71F8C39BE6EF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:pepperl-fuchs:icrl-m-16rj45\\/4cp-g-din:-:*:*:*:*:*:*:*","matchCriteriaId":"376BBE27-BC5B-4A8A-9DF6-C9982A797953"}]}]}],"references":[{"url":"http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html","source":"info@cert.vde.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html","source":"info@cert.vde.com","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2021/Jun/0","source":"info@cert.vde.com","tags":["Mailing List","Third Party Advisory"]},{"url":"https://cert.vde.com/de-de/advisories/vde-2020-040","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en-us/advisories/vde-2020-053","source":"info@cert.vde.com","tags":["Third Party Advisory"]},{"url":"https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/","source":"info@cert.vde.com","tags":["Exploit","Third Party Advisory"]},{"url":"http://packetstormsecurity.com/files/162903/Korenix-CSRF-Backdoor-Accounts-Command-Injection-Missing-Authentication.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://packetstormsecurity.com/files/165875/Korenix-Technology-JetWave-CSRF-Command-Injection-Missing-Authentication.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://seclists.org/fulldisclosure/2021/Jun/0","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://cert.vde.com/de-de/advisories/vde-2020-040","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://cert.vde.com/en-us/advisories/vde-2020-053","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://sec-consult.com/vulnerability-lab/advisory/multiple-critical-vulnerabilities-in-korenix-technology-westermo-pepperl-fuchs/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}