Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-16741
Vulnerability from cvelistv5
Published
2018-01-12 20:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://cert.vde.com/en-us/advisories/vde-2017-006 | ||
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2017-006 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03 | Patch, Third Party Advisory, US Government Resource |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | PHOENIX CONTACT FL SWITCH |
Version: PHOENIX CONTACT FL SWITCH |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:20.313Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "PHOENIX CONTACT FL SWITCH", "vendor": "n/a", "versions": [ { "status": "affected", "version": "PHOENIX CONTACT FL SWITCH" } ] } ], "datePublic": "2018-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-16T13:57:02", "orgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "shortName": "icscert" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-16741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PHOENIX CONTACT FL SWITCH", "version": { "version_data": [ { "version_value": "PHOENIX CONTACT FL SWITCH" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2017-006", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ] } } } }, "cveMetadata": { "assignerOrgId": "7d14cffa-0d7d-4270-9dc0-52cabd5a23a6", "assignerShortName": "icscert", "cveId": "CVE-2017-16741", "datePublished": "2018-01-12T20:00:00", "dateReserved": "2017-11-09T00:00:00", "dateUpdated": "2024-08-05T20:35:20.313Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2017-16741\",\"sourceIdentifier\":\"ics-cert@hq.dhs.gov\",\"published\":\"2018-01-12T20:29:00.340\",\"lastModified\":\"2024-11-21T03:16:53.037\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.\"},{\"lang\":\"es\",\"value\":\"Se ha descubierto un problema de exposici\u00f3n de informaci\u00f3n en productos PHOENIX CONTACT FL SWITCH 3xxx, 4xxx y 48xxx Series que ejecutan las versiones de firmware 1.0 a 1.32. Un atacante remoto no autenticado podr\u00eda emplear Monitor Mode en el dispositivo para leer informaci\u00f3n de diagn\u00f3stico.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ics-cert@hq.dhs.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"6F748030-ECA1-4013-89EE-58FB506E302A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD6E20C-23E3-4D04-879B-2AC6EF428947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"4FEE18F6-5F4C-4CB1-9B38-CA376D71612C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378D94CF-D885-42D4-8A0E-21CD748F6807\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"77DCA24C-FCB8-4979-B54B-A2A098711C43\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9C98D8-21D3-45C1-B060-A9A9E2F3C097\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"50E01B45-DD15-41E4-945F-123B73360120\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7741E125-4A42-49D9-B042-F9CE55635AAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"EB35B6F8-5D90-4604-884E-5C9B89AF2B91\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6CE354-013E-4F95-BC30-1C9B319EBED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3C25D258-044B-47AE-A668-AAD287D8974D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AABEF33-10A0-4799-B838-56EDD19DA0C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"49A89D53-44D8-4023-B064-B7B448181A2D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183345F0-1A43-4721-99C1-6F1A7DF951C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"CB79BD9B-F638-44A4-B48A-35FCB11A9F3B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745B393D-B1D4-49B3-B869-54B103DDC09E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"B27A1E3E-5286-44B0-832E-7DE36973537B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"326D8451-B4FA-4888-9CA9-BD9695C825F6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE50CC4-384B-499F-BC7D-E66AB2B8D42F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"BFEE95D9-F800-4620-A772-79999997C8D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE5BBAFE-2229-4472-BED8-30A5A2547746\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"9948A68E-C0FA-4F57-9F33-C3D754A70247\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"0BDE07BD-7F3B-4708-8CA9-E8D0BFA75192\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94001A55-C569-4FD3-BB74-9EC7D85C1473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"9CD96136-0226-4C50-AB20-23D43A59E6A1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3384E849-9456-4BC2-97F7-F451302D607F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB83F75C-61AD-4161-B7FC-815BB79DD84C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"95C6B3B8-C472-4891-BFB4-0D8BD2FB3EA1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A8884E-A04E-4A52-9CE6-8EE210F6CA8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"90EC16BB-4437-4F6D-AF6F-98DEDC88B3A3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D2ACFB7-4685-48F2-8741-AD0ECFC8804E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"95548922-A0F4-4820-8F0B-D1A9FB65783C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"5D422D38-9E5A-418E-B0BF-152B703968D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24767260-220D-40D2-82D4-944DD1557C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"07A20C94-DC20-4CC7-9DFC-2F57DCE3A2EF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1D7163-5489-47A3-B6DF-13C2C137CD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"34E26731-B310-47D8-99CC-752074944397\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4CF1D6-AEB2-4A75-959A-81F70FE7A634\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"68E7EE37-9E84-4722-AE22-25AF3D402FA3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A11C522-B022-4F38-9DE9-189BAB367CA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"DC5F84EB-9E88-4958-9ECD-E8D428715495\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"487FB566-6913-4535-A74F-2244A0E2F288\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F3A41E-72FA-4876-B29C-810A83237E74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"FA669231-0327-4D71-976C-50961CCFFBD1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"81C8FF1E-3FF5-47FA-83FA-3A74DA5BAA87\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516A419-3B65-4866-91AD-7824C7D93A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3535FEAD-26DA-46EA-BE51-119A8F7F152E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D8EBCA-D4C9-4698-B0A6-78796228ABD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3535FEAD-26DA-46EA-BE51-119A8F7F152E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D8EBCA-D4C9-4698-B0A6-78796228ABD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3B487717-1253-4A30-8936-507039003258\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13750CC-A1ED-4AC5-BE05-C70B0A8E697D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.32\",\"matchCriteriaId\":\"3D440E3E-FF36-4584-ACC9-C3DAE50930E1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C8DB2C-0647-42FC-A401-264A6A00621E\"}]}]}],\"references\":[{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2017-006\",\"source\":\"ics-cert@hq.dhs.gov\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03\",\"source\":\"ics-cert@hq.dhs.gov\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"https://cert.vde.com/en-us/advisories/vde-2017-006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
fkie_cve-2017-16741
Vulnerability from fkie_nvd
Published
2018-01-12 20:29
Modified
2024-11-21 03:16
Severity ?
Summary
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.
References
▼ | URL | Tags | |
---|---|---|---|
ics-cert@hq.dhs.gov | https://cert.vde.com/en-us/advisories/vde-2017-006 | ||
ics-cert@hq.dhs.gov | https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/en-us/advisories/vde-2017-006 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03 | Patch, Third Party Advisory, US Government Resource |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F748030-ECA1-4013-89EE-58FB506E302A", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDD6E20C-23E3-4D04-879B-2AC6EF428947", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FEE18F6-5F4C-4CB1-9B38-CA376D71612C", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "matchCriteriaId": "378D94CF-D885-42D4-8A0E-21CD748F6807", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DCA24C-FCB8-4979-B54B-A2A098711C43", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA9C98D8-21D3-45C1-B060-A9A9E2F3C097", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "50E01B45-DD15-41E4-945F-123B73360120", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "7741E125-4A42-49D9-B042-F9CE55635AAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB35B6F8-5D90-4604-884E-5C9B89AF2B91", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6CE354-013E-4F95-BC30-1C9B319EBED2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C25D258-044B-47AE-A668-AAD287D8974D", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AABEF33-10A0-4799-B838-56EDD19DA0C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "49A89D53-44D8-4023-B064-B7B448181A2D", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "183345F0-1A43-4721-99C1-6F1A7DF951C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CB79BD9B-F638-44A4-B48A-35FCB11A9F3B", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "745B393D-B1D4-49B3-B869-54B103DDC09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B27A1E3E-5286-44B0-832E-7DE36973537B", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "326D8451-B4FA-4888-9CA9-BD9695C825F6", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAE50CC4-384B-499F-BC7D-E66AB2B8D42F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFEE95D9-F800-4620-A772-79999997C8D8", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE5BBAFE-2229-4472-BED8-30A5A2547746", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9948A68E-C0FA-4F57-9F33-C3D754A70247", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "matchCriteriaId": "20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BDE07BD-7F3B-4708-8CA9-E8D0BFA75192", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "94001A55-C569-4FD3-BB74-9EC7D85C1473", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9CD96136-0226-4C50-AB20-23D43A59E6A1", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3384E849-9456-4BC2-97F7-F451302D607F", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB83F75C-61AD-4161-B7FC-815BB79DD84C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95C6B3B8-C472-4891-BFB4-0D8BD2FB3EA1", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A8884E-A04E-4A52-9CE6-8EE210F6CA8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90EC16BB-4437-4F6D-AF6F-98DEDC88B3A3", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D2ACFB7-4685-48F2-8741-AD0ECFC8804E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "95548922-A0F4-4820-8F0B-D1A9FB65783C", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D422D38-9E5A-418E-B0BF-152B703968D7", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "24767260-220D-40D2-82D4-944DD1557C68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07A20C94-DC20-4CC7-9DFC-2F57DCE3A2EF", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1D7163-5489-47A3-B6DF-13C2C137CD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34E26731-B310-47D8-99CC-752074944397", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CF1D6-AEB2-4A75-959A-81F70FE7A634", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "68E7EE37-9E84-4722-AE22-25AF3D402FA3", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A11C522-B022-4F38-9DE9-189BAB367CA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DC5F84EB-9E88-4958-9ECD-E8D428715495", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "487FB566-6913-4535-A74F-2244A0E2F288", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "67F3A41E-72FA-4876-B29C-810A83237E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA669231-0327-4D71-976C-50961CCFFBD1", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81C8FF1E-3FF5-47FA-83FA-3A74DA5BAA87", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5516A419-3B65-4866-91AD-7824C7D93A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3535FEAD-26DA-46EA-BE51-119A8F7F152E", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9D8EBCA-D4C9-4698-B0A6-78796228ABD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3535FEAD-26DA-46EA-BE51-119A8F7F152E", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9D8EBCA-D4C9-4698-B0A6-78796228ABD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B487717-1253-4A30-8936-507039003258", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "E13750CC-A1ED-4AC5-BE05-C70B0A8E697D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D440E3E-FF36-4584-ACC9-C3DAE50930E1", "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5C8DB2C-0647-42FC-A401-264A6A00621E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information." }, { "lang": "es", "value": "Se ha descubierto un problema de exposici\u00f3n de informaci\u00f3n en productos PHOENIX CONTACT FL SWITCH 3xxx, 4xxx y 48xxx Series que ejecutan las versiones de firmware 1.0 a 1.32. Un atacante remoto no autenticado podr\u00eda emplear Monitor Mode en el dispositivo para leer informaci\u00f3n de diagn\u00f3stico." } ], "id": "CVE-2017-16741", "lastModified": "2024-11-21T03:16:53.037", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-01-12T20:29:00.340", "references": [ { "source": "ics-cert@hq.dhs.gov", "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "source": "ics-cert@hq.dhs.gov", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ], "sourceIdentifier": "ics-cert@hq.dhs.gov", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "ics-cert@hq.dhs.gov", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
var-201801-0159
Vulnerability from variot
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information. FL SWITCH is a managed Ethernet switch from the Phoenix Contact group in Germany
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201801-0159", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3008t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4008t-2sfp", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3016t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3004t-fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3016", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3004t-fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3012e-2sfx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3008", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3012e-2fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3005t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3006t-2fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3006t-2fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3008t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3006t-2fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4008t-2sfp", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3012e-2fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3016e", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3004t-fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3008", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3016", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3004t-fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4824e-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3016t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3006t-2fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3016e", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3006t-2fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3006t-2fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3012e-2sfx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4824e-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.32" }, { "model": "fl switch 3004t-fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3004t-fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3005", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3005t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3006t-2fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3006t-2fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3006t-2fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3008", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3008t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3012e-2fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3012e-2sfx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3016", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3016e", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 3016t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4008t-2sfp", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "fl switch 4824e-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "3xxx\u003e=1.0,\u003c=1.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "4xxx\u003e=1.0,\u003c=1.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "8xxx\u003e=1.0,\u003c=1.32" }, { "model": null, "scope": "eq", "trust": 0.4, "vendor": "fl switch 4800e 24fx sm 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3005", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2sfp", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2gt 4fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2gt 3fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx lc 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm st 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3005t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx st 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm lc 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4012t 2gt 2fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4012t 2gt 2fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4824e 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4800e 24fx 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3012e 2fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3004t fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4000t 8poe 2sfp r", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3004t fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3008", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3008t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3012e 2sfx", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3004t-fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3004t-fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3005_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3005t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3008_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3008t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3012e-2sfx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2sfp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4824e-4gc_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012036" } ] }, "cve": "CVE-2017-16741", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CVE-2017-16741", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "CNVD-2018-00909", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "IVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "exploitabilityScore": 3.9, "id": "CVE-2017-16741", "impactScore": 1.4, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2017-16741", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2017-16741", "trust": 0.8, "value": "Medium" }, { "author": "CNVD", "id": "CNVD-2018-00909", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201801-527", "trust": 0.6, "value": "MEDIUM" }, { "author": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1", "trust": 0.2, "value": "MEDIUM" } ] } ], "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNNVD", "id": "CNNVD-201801-527" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information. FL SWITCH is a managed Ethernet switch from the Phoenix Contact group in Germany", "sources": [ { "db": "NVD", "id": "CVE-2017-16741" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-16741", "trust": 3.2 }, { "db": "ICS CERT", "id": "ICSA-18-011-03", "trust": 3.0 }, { "db": "CERT@VDE", "id": "VDE-2017-006", "trust": 1.0 }, { "db": "CNVD", "id": "CNVD-2018-00909", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201801-527", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2017-012036", "trust": 0.8 }, { "db": "IVD", "id": "E2E12EAF-39AB-11E9-A195-000C29342CB1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNNVD", "id": "CNNVD-201801-527" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "id": "VAR-201801-0159", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" } ], "trust": 1.7375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS" ], "sub_category": null, "trust": 0.8 } ], "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" } ] }, "last_update_date": "2024-11-23T22:30:32.434000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "https://www.phoenixcontact.com/online/portal/jp" }, { "title": "PHOENIX CONTACT FL SWITCH Information Disclosure Vulnerability Patch", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/113423" }, { "title": "PHOENIX CONTACT FL SWITCH 3xxx , 4xxx and 48xxx Series Product information disclosure vulnerability repair measures", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=77748" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNNVD", "id": "CNNVD-201801-527" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-200", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-011-03" }, { "trust": 1.0, "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-16741" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-16741" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNNVD", "id": "CNNVD-201801-527" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" }, { "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "db": "CNNVD", "id": "CNNVD-201801-527" }, { "db": "NVD", "id": "CVE-2017-16741" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-15T00:00:00", "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "date": "2018-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2018-00909" }, { "date": "2018-02-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "date": "2018-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-527" }, { "date": "2018-01-12T20:29:00.340000", "db": "NVD", "id": "CVE-2017-16741" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-01-15T00:00:00", "db": "CNVD", "id": "CNVD-2018-00909" }, { "date": "2018-02-14T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-012036" }, { "date": "2018-01-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201801-527" }, { "date": "2024-11-21T03:16:53.037000", "db": "NVD", "id": "CVE-2017-16741" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-527" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "PHOENIX CONTACT FL SWITCH Information Disclosure Vulnerability", "sources": [ { "db": "IVD", "id": "e2e12eaf-39ab-11e9-a195-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-00909" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "information disclosure", "sources": [ { "db": "CNNVD", "id": "CNNVD-201801-527" } ], "trust": 0.6 } }
ICSA-18-011-03
Vulnerability from csaf_cisa
Published
2018-01-11 00:00
Modified
2018-01-11 00:00
Summary
PHOENIX CONTACT FL SWITCH
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
ATTENTION: Remotely exploitable/low skill level to exploit.
Critical infrastructure sectors
Communications, Critical Manufacturing, Information Technology
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
Recommended Practices
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Recommended Practices
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin" ], "organization": "Positive Technologies", "summary": "discovering these vulnerabilities" }, { "organization": "PHOENIX CONTACT", "summary": "reporting to CERT@VDE that their products are affected" }, { "organization": "CERT@VDE", "summary": "coordinating these vulnerabilities with ICS-CERT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-011-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-011-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-011-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-011-03" } ], "title": "PHOENIX CONTACT FL SWITCH", "tracking": { "current_release_date": "2018-01-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-011-03", "initial_release_date": "2018-01-11T00:00:00.000000Z", "revision_history": [ { "date": "2018-01-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-011-03 PHOENIX CONTACT FL SWITCH" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4012T-2GT-2FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "FL SWITCH 4012T-2GT-2FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX-4G: firmware Version 1.0 to 1.32 are affectedC", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX-4G" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3004T-FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "FL SWITCH 3004T-FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4012T 2GT 2FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "FL SWITCH 4012T 2GT 2FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2GT-3FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2GT-3FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM LC-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM LC-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3004T-FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "FL SWITCH 3004T-FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016E: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "FL SWITCH 3016E" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4000T-8POE-2SFP-R: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "FL SWITCH 4000T-8POE-2SFP-R" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3012E-2FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "FL SWITCH 3012E-2FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "FL SWITCH 3016" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3008T: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "FL SWITCH 3008T" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2GT-4FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2GT-4FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016T: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "FL SWITCH 3016T" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX ST-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00018" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX ST-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX LC-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00019" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX LC-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4800E-24FX-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00020" } } ], "category": "product_name", "name": "FL SWITCH 4800E-24FX-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3012E-2SFX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00021" } } ], "category": "product_name", "name": "FL SWITCH 3012E-2SFX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM ST-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00022" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM ST-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4824E-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00023" } } ], "category": "product_name", "name": "FL SWITCH 4824E-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3008: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00024" } } ], "category": "product_name", "name": "FL SWITCH 3008" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2SFP: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00025" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2SFP" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4800E-24FX SM-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00026" } } ], "category": "product_name", "name": "FL SWITCH 4800E-24FX SM-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00027" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM-4GC" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16743", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device. CVE-2017-16743 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16743" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "vendor_fix", "details": "FL SWITCH 4808E-16FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] } ] }, { "cve": "CVE-2017-16741", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information. CVE-2017-16741 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16741" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "vendor_fix", "details": "FL SWITCH 4808E-16FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] } ] } ] }
icsa-18-011-03
Vulnerability from csaf_cisa
Published
2018-01-11 00:00
Modified
2018-01-11 00:00
Summary
PHOENIX CONTACT FL SWITCH
Notes
CISA Disclaimer
This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov
Legal Notice
All information products included in https://us-cert.cisa.gov/ics are provided "as is" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.
Risk evaluation
ATTENTION: Remotely exploitable/low skill level to exploit.
Critical infrastructure sectors
Communications, Critical Manufacturing, Information Technology
Countries/areas deployed
Worldwide
Company headquarters location
Germany
Recommended Practices
NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
Recommended Practices
ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.
Recommended Practices
ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.
Recommended Practices
Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.
Recommended Practices
Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.
Exploitability
No known public exploits specifically target these vulnerabilities.
{ "document": { "acknowledgments": [ { "names": [ "Ilya Karpov", "Evgeniy Druzhinin" ], "organization": "Positive Technologies", "summary": "discovering these vulnerabilities" }, { "organization": "PHOENIX CONTACT", "summary": "reporting to CERT@VDE that their products are affected" }, { "organization": "CERT@VDE", "summary": "coordinating these vulnerabilities with ICS-CERT" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "ATTENTION: Remotely exploitable/low skill level to exploit.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC/ICS-CERT recommends that users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should: Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the Internet; Locate control system networks and remote devices behind firewalls, and isolate them from the business network; When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "ICS-CERT also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available in the ICS -CERT Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies, that is available for download from the ICS-CERT web site.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to ICS-CERT for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-011-03 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-011-03.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-011-03 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-011-03" } ], "title": "PHOENIX CONTACT FL SWITCH", "tracking": { "current_release_date": "2018-01-11T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-011-03", "initial_release_date": "2018-01-11T00:00:00.000000Z", "revision_history": [ { "date": "2018-01-11T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-011-03 PHOENIX CONTACT FL SWITCH" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4012T-2GT-2FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0002" } } ], "category": "product_name", "name": "FL SWITCH 4012T-2GT-2FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX-4G: firmware Version 1.0 to 1.32 are affectedC", "product_id": "CSAFPID-0003" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX-4G" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3004T-FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0004" } } ], "category": "product_name", "name": "FL SWITCH 3004T-FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4012T 2GT 2FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0005" } } ], "category": "product_name", "name": "FL SWITCH 4012T 2GT 2FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2GT-3FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0006" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2GT-3FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM LC-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0007" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM LC-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3004T-FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0008" } } ], "category": "product_name", "name": "FL SWITCH 3004T-FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016E: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0009" } } ], "category": "product_name", "name": "FL SWITCH 3016E" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00010" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4000T-8POE-2SFP-R: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00011" } } ], "category": "product_name", "name": "FL SWITCH 4000T-8POE-2SFP-R" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3012E-2FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00012" } } ], "category": "product_name", "name": "FL SWITCH 3012E-2FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00013" } } ], "category": "product_name", "name": "FL SWITCH 3016" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3006T-2FX ST: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00014" } } ], "category": "product_name", "name": "FL SWITCH 3006T-2FX ST" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3008T: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00015" } } ], "category": "product_name", "name": "FL SWITCH 3008T" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2GT-4FX SM: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00016" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2GT-4FX SM" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3016T: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00017" } } ], "category": "product_name", "name": "FL SWITCH 3016T" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX ST-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00018" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX ST-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX LC-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00019" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX LC-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4800E-24FX-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00020" } } ], "category": "product_name", "name": "FL SWITCH 4800E-24FX-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3012E-2SFX: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00021" } } ], "category": "product_name", "name": "FL SWITCH 3012E-2SFX" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM ST-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00022" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM ST-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4824E-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00023" } } ], "category": "product_name", "name": "FL SWITCH 4824E-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 3008: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00024" } } ], "category": "product_name", "name": "FL SWITCH 3008" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4008T-2SFP: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00025" } } ], "category": "product_name", "name": "FL SWITCH 4008T-2SFP" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4800E-24FX SM-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00026" } } ], "category": "product_name", "name": "FL SWITCH 4800E-24FX SM-4GC" }, { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "FL SWITCH 4808E-16FX SM-4GC: firmware Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-00027" } } ], "category": "product_name", "name": "FL SWITCH 4808E-16FX SM-4GC" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-16743", "cwe": { "id": "CWE-285", "name": "Improper Authorization" }, "notes": [ { "category": "summary", "text": "A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device. CVE-2017-16743 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16743" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "vendor_fix", "details": "FL SWITCH 4808E-16FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] } ] }, { "cve": "CVE-2017-16741", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information. CVE-2017-16741 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-16741" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T: PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016 PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "vendor_fix", "details": "FL SWITCH 4808E-16FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R PHOENIX CONTACT recommends that affected users upgrade to firmware Version 1.33 or higher", "product_ids": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001", "CSAFPID-0002", "CSAFPID-0003", "CSAFPID-0004", "CSAFPID-0005", "CSAFPID-0006", "CSAFPID-0007", "CSAFPID-0008", "CSAFPID-0009", "CSAFPID-00010", "CSAFPID-00011", "CSAFPID-00012", "CSAFPID-00013", "CSAFPID-00014", "CSAFPID-00015", "CSAFPID-00016", "CSAFPID-00017", "CSAFPID-00018", "CSAFPID-00019", "CSAFPID-00020", "CSAFPID-00021", "CSAFPID-00022", "CSAFPID-00023", "CSAFPID-00024", "CSAFPID-00025", "CSAFPID-00026", "CSAFPID-00027" ] } ] } ] }
ghsa-6c6j-r563-746g
Vulnerability from github
Published
2022-05-14 03:23
Modified
2022-05-14 03:23
Severity ?
Details
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.
{ "affected": [], "aliases": [ "CVE-2017-16741" ], "database_specific": { "cwe_ids": [ "CWE-200" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-01-12T20:29:00Z", "severity": "MODERATE" }, "details": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.", "id": "GHSA-6c6j-r563-746g", "modified": "2022-05-14T03:23:20Z", "published": "2022-05-14T03:23:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-16741" }, { "type": "WEB", "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "type": "CVSS_V3" } ] }
gsd-2017-16741
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-16741", "description": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.", "id": "GSD-2017-16741" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-16741" ], "details": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.", "id": "GSD-2017-16741", "modified": "2023-12-13T01:21:01.028259Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-16741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "PHOENIX CONTACT FL SWITCH", "version": { "version_data": [ { "version_value": "PHOENIX CONTACT FL SWITCH" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2017-006", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.32", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "ics-cert@hq.dhs.gov", "ID": "CVE-2017-16741" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-200" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" }, { "name": "https://cert.vde.com/en-us/advisories/vde-2017-006", "refsource": "CONFIRM", "tags": [], "url": "https://cert.vde.com/en-us/advisories/vde-2017-006" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 1.4 } }, "lastModifiedDate": "2018-05-17T01:29Z", "publishedDate": "2018-01-12T20:29Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.