|Article No°||Product Name||Affected Version(s)|
|1264327||ENERGY AXC PU||< V04.15.00.00|
|1264328||SMARTRTU AXC IG||<= V01.02.00.01|
|1110435||SMARTRTU AXC SG||<= V01.08.00.02|
A Directory Traversal Vulnerability enables arbitrary file access in ENERGY AXC PU Web service.
An authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service.
In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.
The vulnerability enables an attacker to gain access to the file system of the devices. This can enable the attacker to compromise the device in terms of availability, integrity and confidentiality.
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to Phoenix Contacts application note.
Measures to protect network-capable devices with Ethernet connection
Phoenix Contact strongly recommends updating to the latest firmware mentioned in the list of affected products, which fixes this vulnerability.
|Article no||Article||Fixed version|
|1264327||ENERGY AXC PU||V04.15.00.01|
|1110435||SMARTRTU AXC SG||V01.09.00.00|
|1264328||SMARTRTU AXC IG||End of Q3 2023|
* As Infobox (1169323) is discontinued no update will be available.
This vulnerability was discovered and reported by Laokoon SecurITy GmbH on behalf of E.ON Digital Technology GmbH.
PHOENIX CONTACT kindly appreciates the coordinated disclosure of this vulnerability by the finder and thanks CERT@VDE for the coordination and support with this publication.