Share: Email | Twitter

ID

VDE-2018-015

Published

2018-09-21 09:03 (CEST)

Last update

2022-03-01 11:09 (CET)

Vendor(s)

PHOENIX CONTACT GmbH & Co. KG

Product(s)

Article No┬░ Product Name Affected Version(s)
2688459 AXL F BK ETH <= 1.12
2701949 AXL F BK ETH XC <= 1.11
2701815 AXL F BK PN <= 1.0.4

Summary

Incorrect handling request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.


Last Update:

Feb. 18, 2020, 7:52 a.m.

Weakness

Improper Input Validation  (CWE-20) 

Summary

Incorrect handling request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.

Impact

The device stops responding to any network or local port, consequently shutting down this part of the automation system. The bus coupler needs to be restarted by disconnecting the power supply.

Solution

Customers using affected Phoenix Contact AXL F BK are recommended to operate the devices in closed networks or protected with a suitable firewall.
For detailed information on our recommendations for measures to protect network-cabable devices, please refer to our application note:

https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/ah_en_ industrial_security_107913_en_01.pdf

Reported by

This vulnerability was reported by Anne Borcherding, Steffen Pfrang, David Meier und Christian Haas from Fraunhofer IOSB.