Check Point Reference: | CPAI-2020-4123 |
Date Published: | 11 Feb 2024 |
Severity: | High |
Last Updated: | Sunday 11 February, 2024 |
Source: | |
Industry Reference: | CVE-2020-12503 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | Pepperl Fuchs RocketLinx es7510-xt Pepperl Fuchs RocketLinx es8509-xt Pepperl Fuchs RocketLinx es8510-xt Pepperl Fuchs RocketLinx es9528-xtv2 Pepperl Fuchs RocketLinx es7506 Pepperl Fuchs RocketLinx es7510 Pepperl Fuchs RocketLinx es7528 Pepperl Fuchs RocketLinx es8508 Pepperl Fuchs RocketLinx es8508f Pepperl Fuchs RocketLinx es8510 Pepperl Fuchs RocketLinx es8510-xte Pepperl Fuchs RocketLinx es9528 Pepperl Fuchs RocketLinx es9528-xt Pepperl Fuchs icrl-m-8rj45/4sfp-g-din Up to and including 1.3.1 Pepperl Fuchs icrl-m-16rj45/4cp-g-din Up to and including 1.3.1 korenix JetNet 5428g-20sfp korenix JetNet 5810g korenix JetNet 4706f korenix JetNet 4706 korenix JetNet 4510 korenix JetNet 5010 korenix JetNet 5310 korenix JetNet 6095 Pepperl Fuchs icrl-m-16rj45/4cp-g-din Pepperl Fuchs icrl-m-8rj45/4sfp-g-din korenix JetNet 2212x korenix JetNet 2212s korenix JetNet 2212g korenix JetNet 2311 korenix JetNet 3220 |
Vulnerability Description | A command injection vulnerability exists in Korenix JetNet. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system. |
This protection detects attempts to exploit this vulnerability.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Korenix JetNet Command Injection (CVE-2020-12503)