{"vulnerability": "CVE-2020-1251", "sightings": [{"uuid": "933628bf-01ad-4933-aa9a-2d5b91ae1cad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12514", "type": "seen", "source": "https://t.me/cibsecurity/22534", "content": "\u203c CVE-2020-12514 \u203c\n\nPepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-22T22:29:26.000000Z"}, {"uuid": "abbaeb19-7016-4f59-92b0-2ce4142a88de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12519", "type": "seen", "source": "https://t.me/cibsecurity/21043", "content": "\u203c CVE-2020-12519 \u203c\n\nOn Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:24.000000Z"}, {"uuid": "350241ef-672e-4f1b-a84a-601b0fd7e0e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12512", "type": "seen", "source": "https://t.me/cibsecurity/22538", "content": "\u203c CVE-2020-12512 \u203c\n\nPepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-22T22:29:30.000000Z"}, {"uuid": "6f972dee-0424-46b7-bc39-bc3f4b575da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12511", "type": "seen", "source": "https://t.me/cibsecurity/22537", "content": "\u203c CVE-2020-12511 \u203c\n\nPepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a Cross-Site Request Forgery (CSRF) in the web interface.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-22T22:29:29.000000Z"}, {"uuid": "18bb9aaf-2162-4db9-8045-ecd7ba514635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12513", "type": "seen", "source": "https://t.me/cibsecurity/22535", "content": "\u203c CVE-2020-12513 \u203c\n\nPepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-22T22:29:27.000000Z"}, {"uuid": "78010e06-503a-46a8-8d05-5a181831d7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12518", "type": "seen", "source": "https://t.me/cibsecurity/21033", "content": "\u203c CVE-2020-12518 \u203c\n\nOn Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:14.000000Z"}, {"uuid": "5f7f42f8-7567-4e7b-b40d-3a67322e0fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12517", "type": "seen", "source": "https://t.me/cibsecurity/21032", "content": "\u203c CVE-2020-12517 \u203c\n\nOn Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T02:43:13.000000Z"}, {"uuid": "2f5c0f17-c491-4195-8838-6abd1ab95af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18621", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T09:25:21.000000Z"}, {"uuid": "9354627b-f475-4d9e-98fe-6e71f27449fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18601", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T08:25:30.000000Z"}, {"uuid": "bb8e697c-6c01-4984-af01-27eb09f8db99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18581", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:36:34.000000Z"}, {"uuid": "74c601ea-4935-4a97-9c66-4a6734243c18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18561", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:33:31.000000Z"}, {"uuid": "8c995e79-b22f-42d7-bc1d-6ff5cb44316e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18809", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T14:33:40.000000Z"}, {"uuid": "99ed8675-0e8e-4b82-9ed4-50ffabe34f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18848", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T14:53:17.000000Z"}, {"uuid": "01665c5c-a606-4b33-8d81-8f32f8cd8528", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18867", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T15:23:18.000000Z"}, {"uuid": "b3d2d9df-9a01-4141-b368-074143130844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18887", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T15:25:04.000000Z"}, {"uuid": "f0bad027-2bb4-4a7d-bafd-1fdf4685472a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18700", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:25:28.000000Z"}, {"uuid": "0b03a88c-6476-41af-ba16-1e48408b9d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18829", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T14:40:44.000000Z"}, {"uuid": "4b229783-9b70-4f9a-99e7-2bcda6c16861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18680", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:03:11.000000Z"}, {"uuid": "a5440ebf-a8bb-4cbc-a218-1edc1b1666ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18712", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:33:36.000000Z"}, {"uuid": "94549c99-5b4d-4010-a707-0c57e7e76011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18641", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T10:25:22.000000Z"}, {"uuid": "a4ee31e0-ce00-4a5a-9d1a-c5afc9709633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18791", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T14:25:07.000000Z"}, {"uuid": "274690a5-53d8-4f94-af0e-9001e1fb2c57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18771", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T14:03:07.000000Z"}, {"uuid": "90a6eecf-1c07-467c-a95f-61b037375772", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18752", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T13:25:15.000000Z"}, {"uuid": "e4b65d24-2425-4500-9085-109239136a03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18732", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:40:56.000000Z"}, {"uuid": "12148ee1-2717-4dc1-b1f0-5c1f6158a662", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12516", "type": "seen", "source": "https://t.me/cibsecurity/18661", "content": "\u203c CVE-2020-12516 \u203c\n\nOlder firmware versions (FW1 up to FW10) of the WAGO PLC family 750-88x and 750-352 are vulnerable for a special denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T11:25:34.000000Z"}, {"uuid": "9731fba4-5725-4d80-9275-4395f01304c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12510", "type": "seen", "source": "https://t.me/cibsecurity/16607", "content": "\u203c CVE-2020-12510 \u203c\n\nThe default installation path of the TwinCAT XAR 3.1 software in all versions is underneath C:\\TwinCAT. If the directory does not exist it and further subdirectories are created with permissions which allow every local user to modify the content. The default installation registers TcSysUI.exe for automatic execution upon log in of a user. If a less privileged user has a local account he or she can replace TcSysUI.exe. It will be executed automatically by another user during login. This is also true for users with administrative access. Consequently, a less privileged user can trick a higher privileged user into executing code he or she modified this way. By default Beckhoff\u00e2\u20ac\u2122s IPCs are shipped with TwinCAT software installed this way and with just a single local user configured. Thus the vulnerability exists if further less privileged users have been added.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-19T20:41:46.000000Z"}]}