Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Pepperl+Fuchs — Vulnerabilities & Security Advisories 13

Browse all 13 CVE security advisories affecting Pepperl+Fuchs. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Pepperl+Fuchs specializes in industrial automation and sensor technology, serving manufacturing and process control industries. Historically, their products have faced vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, often stemming from web interfaces and communication protocols. The company has addressed security flaws in their network components and industrial control systems, with 13 CVEs documented to date. While no major public security incidents have been widely reported, their exposure to common OT vulnerabilities reflects broader industry challenges in securing connected industrial equipment. Their security posture has evolved to include more robust authentication and encryption measures to mitigate risks in increasingly connected industrial environments.

CVE IDTitleCVSSSeverityPublished
CVE-2025-41655 PEPPERL+FUCHS: Attacker can cause a DoS via URL — Profinet Gateway FB8122A.1.ELCWE-306 7.5 High2025-05-26
CVE-2025-41654 PEPPERL+FUCHS: Profinet Gateway LB8122A.1.EL – Device is affected by information disclosure via the SNMP protocol — Profinet Gateway FB8122A.1.ELCWE-306 8.2 High2025-05-26
CVE-2025-1985 PEPPERL+FUCHS: Profinet Gateway LB8122A.1.EL – Device is affected by XSS vulnerability — Profinet Gateway FB8122A.1.ELCWE-79 6.1 Medium2025-05-26
CVE-2024-38502 Pepperl+Fuchs: Device Master ICDM-RX/* XSS vulnerability allows stored XSS — ICDM-RX/TCP-DB9/RJ45-DINCWE-79 7.1 High2024-08-13
CVE-2024-38501 Pepperl+Fuchs: Device Master ICDM-RX/* XSS vulnerability allows HTML injection — ICDM-RX/TCP-DB9/RJ45-DINCWE-79 6.1 Medium2024-08-13
CVE-2024-5849 Pepperl+Fuchs: Device Master ICDM-RX/* XSS vulnerability allows reflected XSS — ICDM-RX/TCP-DB9/RJ45-DINCWE-79 7.1 High2024-08-13
CVE-2024-6422 Pepperl+Fuchs: OIT Products can be manipulated via unintended Telnet access — OIT1500-F113-B12-CBCWE-306 9.8 Critical2024-07-10
CVE-2024-6421 Pepperl+Fuchs: Incorrectly configured FTP-Server in OIT Products — OIT1500-F113-B12-CBCWE-552 7.5 High2024-07-10
CVE-2020-12504 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinxCWE-912 9.8 Critical2020-10-15
CVE-2020-12503 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinxCWE-863 7.2 High2020-10-15
CVE-2020-12502 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinxCWE-352 8.8 High2020-10-15
CVE-2020-12501 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinxCWE-798 9.8 Critical2020-10-15
CVE-2020-12500 Pepperl+Fuchs improper authorization affects multiple Comtrol RocketLinx products — P+F Comtrol RocketLinxCWE-306 9.8 Critical2020-10-15

This page lists every published CVE security advisory associated with Pepperl+Fuchs. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.