PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow (Update A)

menu_pxc.cgi and index.cgi are prone to buffer overflows. This Advisory handles a different vulnerability than VDE-2018-007 with CVE-2018-10731.

VDE-2018-006A (2018-05-16 08:40 UTC+0200)

CVE Identifier

CVE-2018-10728

Affected Vendors

PHOENIX CONTACT

Affected Products

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33.

Summary

An attacker may insert a carefully crafted cookie into a GET menu_pxc.cgi or GET index.cgi request to cause a buffer overflow that can initiate a Denial of Service attack and execute arbitrary code.

Impact

If vulnerability is exploited, the attacker may disable Web and Telnet services and execute arbitrary code.

Update 2018-05-28

Due to the way this vulnerability was discovered, the Attack Complexity has been changed from HIGH to LOW. This results in a new CVSS Vector with a severity of 9.8.

Solution

Temporary Fix / Mitigation

Customers using Phoenix Contact managed FL SWITCH devices with affected firmware versions are recommended to disable the switch Web Agent.

Remediation

Customers using Phoenix Contact managed FL SWITCH devices with affected firmware versions are recommended to update the firmware to version 1.34 or higher which fixes this vulnerability. The updated firmware may be downloaded from the managed switch product page on the Phoenix Contact website:

Article No. Model Updated Firmware
2891030 FL SWITCH 3005 www.phoenixcontact.net/qr/2891030/firmware_update
2891032 FL SWITCH 3005T www.phoenixcontact.net/qr/2891032/firmware_update
2891033 FL SWITCH 3004T-FX www.phoenixcontact.net/qr/2891033/firmware_update
2891034 FL SWITCH 3004T-FX ST www.phoenixcontact.net/qr/2891034/firmware_update
2891031 FL SWITCH 3008 www.phoenixcontact.net/qr/2891031/firmware_update
2891035 FL SWITCH 3008T www.phoenixcontact.net/qr/2891035/firmware_update
2891036 FL SWITCH 3006T-2FX www.phoenixcontact.net/qr/2891036/firmware_update
2891037 FL SWITCH 3006T-2FX ST www.phoenixcontact.net/qr/2891037/firmware_update
2891067 FL SWITCH 3012E-2SFX www.phoenixcontact.net/qr/2891067/firmware_update
2891066 FL SWITCH 3016E www.phoenixcontact.net/qr/2891066/firmware_update
2891058 FL SWITCH 3016 www.phoenixcontact.net/qr/2891058/firmware_update
2891059 FL SWITCH 3016T www.phoenixcontact.net/qr/2891059/firmware_update
2891060 FL SWITCH 3006T-2FX SM www.phoenixcontact.net/qr/2891060/firmware_update
2891062 FL SWITCH 4008T-2SFP www.phoenixcontact.net/qr/2891062/firmware_update
2891061 FL SWITCH 4008T-2GT-4FX SM www.phoenixcontact.net/qr/2891061/firmware_update
2891160 FL SWITCH 4008T-2GT-3FX SM www.phoenixcontact.net/qr/2891160/firmware_update
2891073 FL SWITCH 4808E-16FX LC-4GC www.phoenixcontact.net/qr/2891073/firmware_update
2891080 FL SWITCH 4808E-16FX SM-4GC www.phoenixcontact.net/qr/2891080/firmware_update
2891086 FL SWITCH 4808E-16FX SM ST-4GC www.phoenixcontact.net/qr/2891086/firmware_update
2891085 FL SWITCH 4808E-16FX ST-4GC www.phoenixcontact.net/qr/2891085/firmware_update
2891079 FL SWITCH 4808E-16FX-4GC www.phoenixcontact.net/qr/2891079/firmware_update
2891074 FL SWITCH 4808E-16FX SM LC-4GC www.phoenixcontact.net/qr/2891074/firmware_update
2891063 FL SWITCH 4012T 2GT 2FX www.phoenixcontact.net/qr/2891063/firmware_update
2891161 FL SWITCH 4012T-2GT-2FX ST www.phoenixcontact.net/qr/2891161/firmware_update
2891072 FL SWITCH 4824E-4GC www.phoenixcontact.net/qr/2891072/firmware_update
2891102 FL SWITCH 4800E-24FX-4GC www.phoenixcontact.net/qr/2891102/firmware_update
2891104 FL SWITCH 4800E-24FX SM-4GC www.phoenixcontact.net/qr/2891104/firmware_update
2891120 FL SWITCH 3012E-2FX www.phoenixcontact.net/qr/2891120/firmware_update
2891119 FL SWITCH 3012E-2FX SM www.phoenixcontact.net/qr/2891119/firmware_update
2891162 FL SWITCH 4000T-8POE-2SFP-R please contact your local customer service

Reported by

Evgeniy Druzhinin, Georgy Zaytsev and Ilya Karpov (Positive Technologies) reported these vulnerabilities to PHOENIX CONTACT