Article No° | Product Name | Affected Version(s) |
---|---|---|
IO-Link Master 4-EIP | <= v1.5.48 | |
IO-Link Master 4-PNIO | <= v1.5.48 | |
IO-Link Master 8-EIP | <= v1.5.48 | |
IO-Link Master 8-EIP-L | <= v1.5.48 | |
IO-Link Master 8-PNIO | <= v1.5.48 | |
IO-Link Master 8-PNIO-L | <= v1.5.48 | |
IO-Link Master DR-8-EIP | <= v1.5.48 | |
IO-Link Master DR-8-EIP-P | <= v1.5.48 | |
IO-Link Master DR-8-EIP-T | <= v1.5.48 | |
IO-Link Master DR-8-PNIO | <= v1.5.48 | |
IO-Link Master DR-8-PNIO-P | <= v1.5.48 | |
IO-Link Master DR-8-PNIO-T | <= v1.5.48 |
Several vulnerabilities exist within firmware versions up to and including v1.5.48.
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
An issue was discovered in BusyBox before 1.30.0. An out of bounds read in udhcp components (consumed by the DHCP server, client, and relay) allows a remote attacker to leak sensitive information from the stack by sending a crafted DHCP message. This is related to verification in udhcp_get_option() in networking/udhcp/common.c that 4-byte options are indeed 4 bytes.
During key agreement in a TLS handshake using a DH(E) based ciphersuite a malicious server can send a very large prime value to the client. This will cause the client to spend an unreasonably long period of time generating a key for this prime resulting in a hang until the client has finished. This could be exploited in a Denial Of Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd
Pepperl+Fuchs analyzed and identified affected devices.
Remote attackers may exploit multiple vulnerabilities to get access to the device and
execute any program and tap information.
In order to prevent the exploitation of the reported vulnerabilities, we recommend that the
affected units be updated with the following three firmware packages:
Furthermore, it is always recommended to observe the following measures if the affected
products are connected to public networks:
T.Weber (SEC Consult Vulnerability Lab) reported this vulnerability.
CERT@VDE coordinated and provided the CVE IDs.