Home / News / Dangerous vulnerabilities detected in Phoenix Contact hardware

Dangerous vulnerabilities detected in Phoenix Contact hardware

A number of vulnerabilities have been discovered in Phoenix Contact industrial solutions that allow unauthorized access to configuration of devices, decrypt passwords, cause a denial of service, or bypass authentication.

In particular, problems affect industrial switches Phoenix Contact FL NAT SMx and controllers Phoenix Contact PLCNext AXC F 2152.

Phoenix Contact FL NAT SMx Solution contains a vulnerability (CVE-2019-9744) that allows an unauthorized user to access device settings.

The problem affects the following models: FL NAT SMN 8TX-M (2702443), FL NAT SMN 8TX-M-DMG (2989352), FL NAT SMN 8TX (2989365), and FL NAT SMCS 8TX (2989378). The severity of vulnerability is estimated as 8.8 points in the CVSS v3 scale.

The Phoenix Contact PLCNext AXC F 2152 solution revealed three vulnerabilities (CVE-2018-7559, CVE-2019-10998, CVE-2019-10997).

Using the first, attacker can decrypt the password set on the server.

Vulnerability CVE-2019-10998 allows bypassing device authentication mechanism (for a successful attack, an attacker will need physical access to the device).

By exploiting a third vulnerability, an attacker in “man in the middle” position can cause a malfunction in the PLC. Vulnerabilities affect following products: AXC F 2152-2404267 and AXC F 2152-1046568 (Starterkit).

Read also: About 5.5% of detected vulnerabilities used for implementation real attacks

Currently, no exploitation of the above vulnerabilities has been identified.

Phoenix Contact recommends that you have a firewall.

Source: https://ics-cert.us-cert.gov

[Total: 1    Average: 5/5]

About Daniel Zimmermann

Daniel Zimmermann has been writing on security and malware subjects for many years and has been working in the security industry for over 10 years. Daniel was educated at the Saarland University in Saarbrücken, Germany and currently lives in New York.

Check Also

Tortoiseshell attacks Saudi IT companies

Tortoiseshell cybercrime attacks Saudi IT companies

Over the past 14 months, the Tortoiseshell cybercriminal group has attacked at least 11 IT …

One comment

  1. The security vulnerabilities are known to us. You will find corresponding information regarding industrial switches Phoenix Contact FL NAT SMx and controllers Phoenix Contact PLCnext AXC F 2152 on the US-Cert website (https://ics-cert.us-cert.gov/advisories/) and on our Phoenix Contact website (https://phoe.co/ProductSecurityIncidentResponseTeam) .

    Igor Knezevic
    PHOENIX CONTACT GmbH & Co. KG

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.