Vulnerabilites related to Phoenix Contact - PLCnext
cve-2021-34570
Vulnerability from cvelistv5
▼ | URL | Tags |
---|---|---|
https://cert.vde.com/en/advisories/VDE-2021-029/ | x_refsource_CONFIRM |
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Phoenix Contact | AXC F |
Version: AXC F 1152 (1151412) < 2021.0.5 LTS Version: AXC F 2152 (2404267) < 2021.0.5 LTS Version: AXC F 3152 (1069208) < 2021.0.5 LTS Version: AXC F 2152 Starterkit (1046568) < 2021.0.5 LTS |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T00:12:50.435Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en/advisories/VDE-2021-029/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AXC F", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "AXC F 1152 (1151412)", "versionType": "custom" }, { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "AXC F 2152 (2404267)", "versionType": "custom" }, { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "AXC F 3152 (1069208)", "versionType": "custom" }, { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "AXC F 2152 Starterkit (1046568)", "versionType": "custom" } ] }, { "product": "RFC", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "RFC 4072S (1051328)", "versionType": "custom" } ] }, { "product": "PLCnext", "vendor": "Phoenix Contact", "versions": [ { "lessThan": "2021.0.5 LTS", "status": "affected", "version": "PLCnext Technology Starterkit (1188165)", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "The vulnerability was discovered by Oliver Carrigan of Dionach. We kindly appreciate the coordinated disclosure of these vulnerabilities by the finder. PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication." } ], "datePublic": "2021-08-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-27T08:25:09", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en/advisories/VDE-2021-029/" } ], "solutions": [ { "lang": "en", "value": "Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0.5 LTS or higher which fixes this vulnerability." } ], "source": { "advisory": "VDE-2021-029", "discovery": "EXTERNAL" }, "title": "Phoenix Contact: DoS for PLCnext Control devices in versions prior to 2021.0.5 LTS", "workarounds": [ { "lang": "en", "value": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:\nMeasures to protect network-capable devices with Ethernet connection" } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-08-03T22:00:00.000Z", "ID": "CVE-2021-34570", "STATE": "PUBLIC", "TITLE": "Phoenix Contact: DoS for PLCnext Control devices in versions prior to 2021.0.5 LTS" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AXC F", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "AXC F 1152 (1151412)", "version_value": "2021.0.5 LTS" }, { "version_affected": "\u003c", "version_name": "AXC F 2152 (2404267)", "version_value": "2021.0.5 LTS" }, { "version_affected": "\u003c", "version_name": "AXC F 3152 (1069208)", "version_value": "2021.0.5 LTS" }, { "version_affected": "\u003c", "version_name": "AXC F 2152 Starterkit (1046568)", "version_value": "2021.0.5 LTS" } ] } }, { "product_name": "RFC", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "RFC 4072S (1051328)", "version_value": "2021.0.5 LTS" } ] } }, { "product_name": "PLCnext", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "PLCnext Technology Starterkit (1188165)", "version_value": "2021.0.5 LTS" } ] } } ] }, "vendor_name": "Phoenix Contact" } ] } }, "credit": [ { "lang": "eng", "value": "The vulnerability was discovered by Oliver Carrigan of Dionach. We kindly appreciate the coordinated disclosure of these vulnerabilities by the finder. PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en/advisories/VDE-2021-029/", "refsource": "CONFIRM", "url": "https://cert.vde.com/en/advisories/VDE-2021-029/" } ] }, "solution": [ { "lang": "en", "value": "Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0.5 LTS or higher which fixes this vulnerability." } ], "source": { "advisory": "VDE-2021-029", "discovery": "EXTERNAL" }, "work_around": [ { "lang": "en", "value": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:\nMeasures to protect network-capable devices with Ethernet connection" } ] } } }, "cveMetadata": { "assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-34570", "datePublished": "2021-09-27T08:25:09.502074Z", "dateReserved": "2021-06-10T00:00:00", "dateUpdated": "2024-09-16T22:09:31.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
var-202012-0104
Vulnerability from variot
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot. Phoenix Contact PLCnext Control The device contains an input verification vulnerability.Denial of service (DoS) It may be put into a state
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0104", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "plcnext", "scope": "lt", "trust": 1.0, "vendor": "phoenixcontact", "version": "2021.0" }, { "model": "plcnext", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": null }, { "model": "plcnext", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "plcnext firmware 2021.0 lts" }, { "model": "contact phoenix contact plcnext control devices lts", "scope": "lt", "trust": 0.6, "vendor": "phoenix", "version": "2021.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "cve": "CVE-2020-12521", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CVE-2020-12521", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.1, "confidentialityImpact": "NONE", "exploitabilityScore": 6.5, "id": "CNVD-2021-07250", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "ADJACENT", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "exploitabilityScore": 2.8, "id": "CVE-2020-12521", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 2.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Adjacent Network", "author": "OTHER", "availabilityImpact": "High", "baseScore": 6.5, "baseSeverity": "Medium", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2020-014823", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12521", "trust": 1.0, "value": "MEDIUM" }, { "author": "info@cert.vde.com", "id": "CVE-2020-12521", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2020-12521", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2021-07250", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202012-1265", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "db": "NVD", "id": "CVE-2020-12521" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot. Phoenix Contact PLCnext Control The device contains an input verification vulnerability.Denial of service (DoS) It may be put into a state", "sources": [ { "db": "NVD", "id": "CVE-2020-12521" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "CNVD", "id": "CNVD-2021-07250" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12521", "trust": 3.0 }, { "db": "CERT@VDE", "id": "VDE-2020-049", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-014823", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-07250", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202012-1265", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "id": "VAR-202012-0104", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" } ], "trust": 1.13333336 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" } ] }, "last_update_date": "2024-11-23T22:16:12.125000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.phoenixcontact.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014823" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.0 }, { "problemtype": "Incorrect input confirmation (CWE-20) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert.vde.com/en-us/advisories/vde-2020-049" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12521" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "db": "NVD", "id": "CVE-2020-12521" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2021-07250" }, { "date": "2021-09-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "date": "2020-12-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "date": "2020-12-17T23:15:13.137000", "db": "NVD", "id": "CVE-2020-12521" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2021-07250" }, { "date": "2021-09-01T04:53:00", "db": "JVNDB", "id": "JVNDB-2020-014823" }, { "date": "2020-12-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1265" }, { "date": "2024-11-21T04:59:51.477000", "db": "NVD", "id": "CVE-2020-12521" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote or local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1265" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phoenix Contact PLCnext Control Devices input validation error vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2021-07250" }, { "db": "CNNVD", "id": "CNNVD-202012-1265" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "input validation error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1265" } ], "trust": 0.6 } }
var-202012-0101
Vulnerability from variot
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation). Phoenix Contact PLCnext Control A cross-site scripting vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Phoenix Contact PLCnext Control Devices is a programmable logic controller used in industrial environments from Phoenix Contact in Germany. No detailed vulnerability details are currently provided
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202012-0101", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "plcnext", "scope": "lt", "trust": 1.0, "vendor": "phoenixcontact", "version": "2021.0" }, { "model": "plcnext", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": null }, { "model": "plcnext", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "plcnext firmware 2021.0 lts" }, { "model": "contact phoenix contact plcnext control devices lts", "scope": "lt", "trust": 0.6, "vendor": "phoenix", "version": "2021.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "cve": "CVE-2020-12517", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CVE-2020-12517", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 6.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 6.8, "id": "CNVD-2021-07251", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.3, "id": "CVE-2020-12517", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "info@cert.vde.com", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2020-12517", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 9.0, "baseSeverity": "Critical", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2020-12517", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Changed", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-12517", "trust": 1.0, "value": "CRITICAL" }, { "author": "info@cert.vde.com", "id": "CVE-2020-12517", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2020-12517", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2021-07251", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202012-1260", "trust": 0.6, "value": "CRITICAL" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "db": "NVD", "id": "CVE-2020-12517" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation). Phoenix Contact PLCnext Control A cross-site scripting vulnerability exists in the device.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Phoenix Contact PLCnext Control Devices is a programmable logic controller used in industrial environments from Phoenix Contact in Germany. No detailed vulnerability details are currently provided", "sources": [ { "db": "NVD", "id": "CVE-2020-12517" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "CNVD", "id": "CNVD-2021-07251" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-12517", "trust": 3.0 }, { "db": "CERT@VDE", "id": "VDE-2020-049", "trust": 2.4 }, { "db": "JVNDB", "id": "JVNDB-2020-014838", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2021-07251", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202012-1260", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "id": "VAR-202012-0101", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" } ], "trust": 1.13333336 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" } ] }, "last_update_date": "2024-11-23T22:16:12.173000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Top\u00a0Page", "trust": 0.8, "url": "https://www.phoenixcontact.com/" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014838" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-79", "trust": 1.0 }, { "problemtype": "Cross-site scripting (CWE-79) [NVD Evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "https://cert.vde.com/en-us/advisories/vde-2020-049" }, { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-12517" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "db": "NVD", "id": "CVE-2020-12517" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2021-07251" }, { "date": "2021-09-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "date": "2020-12-17T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "date": "2020-12-17T23:15:12.873000", "db": "NVD", "id": "CVE-2020-12517" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2021-01-28T00:00:00", "db": "CNVD", "id": "CNVD-2021-07251" }, { "date": "2021-09-01T05:58:00", "db": "JVNDB", "id": "JVNDB-2020-014838" }, { "date": "2020-12-24T00:00:00", "db": "CNNVD", "id": "CNNVD-202012-1260" }, { "date": "2024-11-21T04:59:51.010000", "db": "NVD", "id": "CVE-2020-12517" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1260" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phoenix Contact PLCnext Control Devices cross-site scripting vulnerability", "sources": [ { "db": "CNVD", "id": "CNVD-2021-07251" }, { "db": "CNNVD", "id": "CNNVD-202012-1260" } ], "trust": 1.2 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-202012-1260" } ], "trust": 0.6 } }