Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2018-10730
Vulnerability from cvelistv5
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://cert.vde.com/de-de/advisories/vde-2018-004 | Patch, Third Party Advisory | |
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/de-de/advisories/vde-2018-004 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T07:46:46.962Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "name": "104231", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104231" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-23T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "name": "104231", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104231" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "name": "https://cert.vde.com/de-de/advisories/vde-2018-004", "refsource": "CONFIRM", "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "name": "104231", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104231" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-10730", "datePublished": "2018-05-17T19:00:00", "dateReserved": "2018-05-04T00:00:00", "dateUpdated": "2024-08-05T07:46:46.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2018-10730\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-05-17T19:29:00.400\",\"lastModified\":\"2024-11-21T03:41:56.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.\"},{\"lang\":\"es\",\"value\":\"Todos los productos Phoenix Contact managed FL SWITCH 3xxx, 4xxx y 48xx que ejecutan la versi\u00f3n del firmware 1.0 a 1.33 son propensos a una inyecci\u00f3n de comandos del sistema operativo.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1D38F9C4-0E71-44CE-ABC6-0143D719895A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD6E20C-23E3-4D04-879B-2AC6EF428947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"73735690-ADDB-499A-AB27-D4DCCE21B0B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378D94CF-D885-42D4-8A0E-21CD748F6807\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"0919C5CB-A4F1-426A-BA73-A85CC58A69B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9C98D8-21D3-45C1-B060-A9A9E2F3C097\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"FB41B06B-B830-4815-A639-40E9B9C32F0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7741E125-4A42-49D9-B042-F9CE55635AAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"DF52AED6-8BF1-4792-8E9D-D226815BD73B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6CE354-013E-4F95-BC30-1C9B319EBED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B36A962A-FAB4-40C6-84C4-5E04E79D8F53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AABEF33-10A0-4799-B838-56EDD19DA0C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B33ADABB-39FF-4613-BE1C-DD7A7B07A2BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183345F0-1A43-4721-99C1-6F1A7DF951C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"711B6552-4F69-41DE-92C0-5EA27CC48709\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745B393D-B1D4-49B3-B869-54B103DDC09E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"A2A4B5F5-A857-4031-9828-EB17A3C42391\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"18C3DBAE-D5F8-46E8-85CC-FE6F2E50AA21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE50CC4-384B-499F-BC7D-E66AB2B8D42F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"9C6A57D5-18F2-4987-9F3C-BBF3F8B44A2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE5BBAFE-2229-4472-BED8-30A5A2547746\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"BDB2BD69-55E6-4D4F-8268-62319DAE35D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"96C7468D-04BA-43B9-9587-A0C7161CBADB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94001A55-C569-4FD3-BB74-9EC7D85C1473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"EDB54F98-884C-4786-836C-372E6DCE0620\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"2261AFB3-48FA-426C-A00B-15196C314755\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB83F75C-61AD-4161-B7FC-815BB79DD84C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"08B535E9-1DF4-4695-8415-F4AFCF254DEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A8884E-A04E-4A52-9CE6-8EE210F6CA8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"37FD7CD9-F2B2-4EA3-9874-5497D4F25179\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D2ACFB7-4685-48F2-8741-AD0ECFC8804E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"EDD1AA63-C7E1-46DB-9326-F4B907ECA31B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"908636A9-A6F9-488E-A279-85C5410F4E69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24767260-220D-40D2-82D4-944DD1557C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"FF60C4B1-3AFC-4748-8AF5-67258B0A6CFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1D7163-5489-47A3-B6DF-13C2C137CD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"0F1927B3-4E4C-4BDA-BDAB-092A3D3B69F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4CF1D6-AEB2-4A75-959A-81F70FE7A634\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B1C6E740-7D1A-42C4-B08F-FA83E8103555\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A11C522-B022-4F38-9DE9-189BAB367CA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"9E4FB6A6-8C3E-41F1-BA2E-56C4E1752775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"ACD4A4CA-5B54-4607-BE99-584DF832869D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F3A41E-72FA-4876-B29C-810A83237E74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1B8AC34C-49CE-4F5D-86C3-DBB1B4202019\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"D8F39794-D0AD-47D7-B451-74D6B92CEB8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516A419-3B65-4866-91AD-7824C7D93A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"2ACA5D46-F2F3-490D-9FC1-2E0C604C3F6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D8EBCA-D4C9-4698-B0A6-78796228ABD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1EFC20D4-03D0-4E29-A5DE-F4393A805FD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13750CC-A1ED-4AC5-BE05-C70B0A8E697D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"4356EA0A-132F-41BD-AE8A-6A409EC05416\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C8DB2C-0647-42FC-A401-264A6A00621E\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104231\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-004\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/104231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-004\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]}]}}" } }
fkie_cve-2018-10730
Vulnerability from fkie_nvd
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
cve@mitre.org | https://cert.vde.com/de-de/advisories/vde-2018-004 | Patch, Third Party Advisory | |
cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/de-de/advisories/vde-2018-004 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D38F9C4-0E71-44CE-ABC6-0143D719895A", "versionEndIncluding": "1.33", "versionStartExcluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDD6E20C-23E3-4D04-879B-2AC6EF428947", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "73735690-ADDB-499A-AB27-D4DCCE21B0B4", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "matchCriteriaId": "378D94CF-D885-42D4-8A0E-21CD748F6807", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0919C5CB-A4F1-426A-BA73-A85CC58A69B0", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA9C98D8-21D3-45C1-B060-A9A9E2F3C097", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FB41B06B-B830-4815-A639-40E9B9C32F0D", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "7741E125-4A42-49D9-B042-F9CE55635AAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF52AED6-8BF1-4792-8E9D-D226815BD73B", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B6CE354-013E-4F95-BC30-1C9B319EBED2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B36A962A-FAB4-40C6-84C4-5E04E79D8F53", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AABEF33-10A0-4799-B838-56EDD19DA0C0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B33ADABB-39FF-4613-BE1C-DD7A7B07A2BF", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "183345F0-1A43-4721-99C1-6F1A7DF951C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "711B6552-4F69-41DE-92C0-5EA27CC48709", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "745B393D-B1D4-49B3-B869-54B103DDC09E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A2A4B5F5-A857-4031-9828-EB17A3C42391", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18C3DBAE-D5F8-46E8-85CC-FE6F2E50AA21", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAE50CC4-384B-499F-BC7D-E66AB2B8D42F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C6A57D5-18F2-4987-9F3C-BBF3F8B44A2E", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE5BBAFE-2229-4472-BED8-30A5A2547746", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDB2BD69-55E6-4D4F-8268-62319DAE35D8", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "matchCriteriaId": "20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "96C7468D-04BA-43B9-9587-A0C7161CBADB", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "94001A55-C569-4FD3-BB74-9EC7D85C1473", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDB54F98-884C-4786-836C-372E6DCE0620", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2261AFB3-48FA-426C-A00B-15196C314755", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB83F75C-61AD-4161-B7FC-815BB79DD84C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08B535E9-1DF4-4695-8415-F4AFCF254DEB", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A8884E-A04E-4A52-9CE6-8EE210F6CA8A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37FD7CD9-F2B2-4EA3-9874-5497D4F25179", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "7D2ACFB7-4685-48F2-8741-AD0ECFC8804E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1AA63-C7E1-46DB-9326-F4B907ECA31B", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "908636A9-A6F9-488E-A279-85C5410F4E69", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "24767260-220D-40D2-82D4-944DD1557C68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF60C4B1-3AFC-4748-8AF5-67258B0A6CFE", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D1D7163-5489-47A3-B6DF-13C2C137CD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F1927B3-4E4C-4BDA-BDAB-092A3D3B69F0", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA4CF1D6-AEB2-4A75-959A-81F70FE7A634", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1C6E740-7D1A-42C4-B08F-FA83E8103555", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A11C522-B022-4F38-9DE9-189BAB367CA6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9E4FB6A6-8C3E-41F1-BA2E-56C4E1752775", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACD4A4CA-5B54-4607-BE99-584DF832869D", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "matchCriteriaId": "67F3A41E-72FA-4876-B29C-810A83237E74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B8AC34C-49CE-4F5D-86C3-DBB1B4202019", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D8F39794-D0AD-47D7-B451-74D6B92CEB8F", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "5516A419-3B65-4866-91AD-7824C7D93A1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACA5D46-F2F3-490D-9FC1-2E0C604C3F6F", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9D8EBCA-D4C9-4698-B0A6-78796228ABD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1EFC20D4-03D0-4E29-A5DE-F4393A805FD9", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "matchCriteriaId": "E13750CC-A1ED-4AC5-BE05-C70B0A8E697D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4356EA0A-132F-41BD-AE8A-6A409EC05416", "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5C8DB2C-0647-42FC-A401-264A6A00621E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection." }, { "lang": "es", "value": "Todos los productos Phoenix Contact managed FL SWITCH 3xxx, 4xxx y 48xx que ejecutan la versi\u00f3n del firmware 1.0 a 1.33 son propensos a una inyecci\u00f3n de comandos del sistema operativo." } ], "id": "CVE-2018-10730", "lastModified": "2024-11-21T03:41:56.450", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-17T19:29:00.400", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104231" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104231" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
ICSA-18-137-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "CERT@VDE", "summary": "reporting the vulnerabilities to NCCIC" }, { "names": [ "Vyacheslav Moskvin", "Semen Sokolov", "Evgeniy Druzhinin", "Georgy Zaytsev", "Ilya Karpov" ], "organization": "Positive Technologies", "summary": "reporting the vulnerabilities to NCCIC" }, { "organization": "PHOENIX CONTACT", "summary": "reporting the vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow for remote code execution and information disclosure.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-137-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-137-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-137-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series", "tracking": { "current_release_date": "2018-05-17T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-137-02", "initial_release_date": "2018-05-17T00:00:00.000000Z", "revision_history": [ { "date": "2018-05-17T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-137-02 PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware: Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10730", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with permission to transfer configuration files to or from the switch or permission to upgrade firmware is able to execute arbitrary OS shell commands.CVE-2018-10730 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10730" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10729", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. Manipulation of a web login request can expose the contents of this file through to the web browser. A successful web interface login attempt is not required to read the configuration file contents.CVE-2018-10729 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10729" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10728", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "An attacker may insert a carefully crafted cookie into a GET request to cause a buffer overflow that can initiate a denial of service attack and execute arbitrary code.CVE-2018-10728 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10728" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10731", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A remote attacker may exploit a long cookie related vulnerability to cause a buffer overflow that allows unauthorized access to the switches operating system files and the insertion of executable code into the OS.CVE-2018-10731 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10731" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
icsa-18-137-02
Vulnerability from csaf_cisa
Notes
{ "document": { "acknowledgments": [ { "organization": "CERT@VDE", "summary": "reporting the vulnerabilities to NCCIC" }, { "names": [ "Vyacheslav Moskvin", "Semen Sokolov", "Evgeniy Druzhinin", "Georgy Zaytsev", "Ilya Karpov" ], "organization": "Positive Technologies", "summary": "reporting the vulnerabilities to NCCIC" }, { "organization": "PHOENIX CONTACT", "summary": "reporting the vulnerabilities to NCCIC" } ], "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Disclosure is not limited", "tlp": { "label": "WHITE", "url": "https://us-cert.cisa.gov/tlp/" } }, "lang": "en-US", "notes": [ { "category": "general", "text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov", "title": "CISA Disclaimer" }, { "category": "legal_disclaimer", "text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.", "title": "Legal Notice" }, { "category": "summary", "text": "Successful exploitation of these vulnerabilities could allow for remote code execution and information disclosure.", "title": "Risk evaluation" }, { "category": "other", "text": "Communications, Critical Manufacturing, Information Technology", "title": "Critical infrastructure sectors" }, { "category": "other", "text": "Worldwide", "title": "Countries/areas deployed" }, { "category": "other", "text": "Germany", "title": "Company headquarters location" }, { "category": "general", "text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.", "title": "Recommended Practices" }, { "category": "general", "text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.", "title": "Recommended Practices" }, { "category": "general", "text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:", "title": "Recommended Practices" }, { "category": "general", "text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.", "title": "Recommended Practices" }, { "category": "other", "text": "No known public exploits specifically target these vulnerabilities.", "title": "Exploitability" } ], "publisher": { "category": "coordinator", "contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870", "name": "CISA", "namespace": "https://www.cisa.gov/" }, "references": [ { "category": "self", "summary": "ICS Advisory ICSA-18-137-02 JSON", "url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-137-02.json" }, { "category": "self", "summary": "ICS Advisory ICSA-18-137-02 Web Version", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02" }, { "category": "external", "summary": "Recommended Practices", "url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf" } ], "title": "PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series", "tracking": { "current_release_date": "2018-05-17T00:00:00.000000Z", "generator": { "engine": { "name": "CISA CSAF Generator", "version": "1.0.0" } }, "id": "ICSA-18-137-02", "initial_release_date": "2018-05-17T00:00:00.000000Z", "revision_history": [ { "date": "2018-05-17T00:00:00.000000Z", "legacy_version": "Initial", "number": "1", "summary": "ICSA-18-137-02 PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003e= 1.0 | \u003c= 1.32", "product": { "name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware: Version 1.0 to 1.32 are affected", "product_id": "CSAFPID-0001" } } ], "category": "product_name", "name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware" } ], "category": "vendor", "name": "PHOENIX CONTACT, Innominate Security Technologies" } ] }, "vulnerabilities": [ { "cve": "CVE-2018-10730", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "notes": [ { "category": "summary", "text": "An attacker with permission to transfer configuration files to or from the switch or permission to upgrade firmware is able to execute arbitrary OS shell commands.CVE-2018-10730 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10730" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.1, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10729", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "summary", "text": "Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. Manipulation of a web login request can expose the contents of this file through to the web browser. A successful web interface login attempt is not required to read the configuration file contents.CVE-2018-10729 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10729" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10728", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "An attacker may insert a carefully crafted cookie into a GET request to cause a buffer overflow that can initiate a denial of service attack and execute arbitrary code.CVE-2018-10728 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10728" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] }, { "cve": "CVE-2018-10731", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "notes": [ { "category": "summary", "text": "A remote attacker may exploit a long cookie related vulnerability to cause a buffer overflow that allows unauthorized access to the switches operating system files and the insertion of executable code into the OS.CVE-2018-10731 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).", "title": "Vulnerability Summary" } ], "product_status": { "known_affected": [ "CSAFPID-0001" ] }, "references": [ { "category": "external", "summary": "web.nvd.nist.gov", "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10731" }, { "category": "external", "summary": "www.first.org", "url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" } ], "remediations": [ { "category": "mitigation", "details": "FL SWITCH 3005", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891030/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3005T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891032/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891033/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3004T-FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891034/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891031/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3008T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891035/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891036/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891037/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2SFX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891067/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016E", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891066/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891058/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3016T", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891059/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3006T-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891060/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2SFP", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891062/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-4FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891061/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4008T-2GT-3FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891160/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891073/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891080/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891086/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX ST-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891085/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891079/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4808E-16FX SM LC-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891074/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T 2GT 2FX", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891063/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4012T-2GT-2FX ST", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891161/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4824E-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891072/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891102/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891104/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4800E-24FX SM-4GC", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891120/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 3012E-2FX SM", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891119/firmware_update" }, { "category": "mitigation", "details": "FL SWITCH 4000T-8POE-2SFP-R", "product_ids": [ "CSAFPID-0001" ], "url": "http://www.phoenixcontact.net/qr/2891162/firmware_update" } ], "scores": [ { "cvss_v3": { "baseScore": 9.0, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "CSAFPID-0001" ] } ] } ] }
ghsa-v9j3-6w7p-3346
Vulnerability from github
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.
{ "affected": [], "aliases": [ "CVE-2018-10730" ], "database_specific": { "cwe_ids": [ "CWE-78" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2018-05-17T19:29:00Z", "severity": "CRITICAL" }, "details": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.", "id": "GHSA-v9j3-6w7p-3346", "modified": "2022-05-14T03:17:40Z", "published": "2022-05-14T03:17:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10730" }, { "type": "WEB", "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/104231" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
var-201805-0723
Vulnerability from variot
All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection. PhoenixContact is a German provider of industrial automation, connectivity and interface solutions for critical infrastructure applications such as communications, critical manufacturing and information technology. PhoenixContactmanagedFLSWITCH has a command injection vulnerability. If the configuration file can be transferred to the switch or transferred from the switch, the attacker can upgrade the firmware to execute any OSshell command. An OS command-execution vulnerability 2. An information-disclosure vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities Attackers can exploit these issues to execute arbitrary code, execute arbitrary OS commands, obtain sensitive information, and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201805-0723", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3008t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4008t-2sfp", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3016", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3016", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3004t-fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3006t-2fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3008", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3016e", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3006t-2fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3012e-2fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3016e", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4824e-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3005", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3016t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005", "scope": "gt", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3004t-fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3012e-2sfx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3012e-2fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3004t-fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4824e-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3006t-2fx st", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3016t", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3008t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3006t-2fx sm", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4008t-2sfp", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3008", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3006t-2fx sm", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3004t-fx", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3006t-2fx st", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3012e-2sfx", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "gte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.0" }, { "model": "fl switch 3005t", "scope": "lte", "trust": 1.0, "vendor": "phoenixcontact", "version": "1.33" }, { "model": "fl switch 3004t-fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3004t-fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3005", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3005t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3006t-2fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3006t-2fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3006t-2fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3008", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3008t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3012e-2fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3012e-2sfx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3016", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3016e", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 3016t", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4000t-8poe-2sfp-r", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4008t-2gt-3fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4008t-2gt-4fx sm", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4008t-2sfp", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4012t 2gt 2fx", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4012t-2gt-2fx st", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4800e-24fx sm-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4800e-24fx-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx lc-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx sm lc-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx sm st-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx sm-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx st-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4808e-16fx-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "fl switch 4824e-4gc", "scope": "eq", "trust": 0.8, "vendor": "phoenix contact", "version": "1.0 to 1.33" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "3xxx\u003e=1.0,\u003c=1.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "4xxx\u003e=1.0,\u003c=1.32" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.6, "vendor": "phoenix", "version": "48xxx\u003e=1.0,\u003c=1.32" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "4xxx1.32" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "4xxx1.0" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "48xx1.32" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "48xx1.0" }, { "model": "contact fl switch 4824e-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4824e-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx st-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx st-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx sm-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx sm-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx sm st-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx sm st-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx sm lc-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx sm lc-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4808e-16fx lc-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4808e-16fx lc-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4800e-24fx-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4800e-24fx-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4800e-24fx sm-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4800e-24fx sm-4gc", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4012t-2gt-2fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4012t-2gt-2fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4012t 2gt 2fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4012t 2gt 2fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4008t-2sfp", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4008t-2sfp", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4008t-2gt-4fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4008t-2gt-4fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4008t-2gt-3fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4008t-2gt-3fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4000t-8poe-2sfp-r", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 4000t-8poe-2sfp-r", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "3xxx1.32" }, { "model": "contact fl switch series", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "3xxx1.0" }, { "model": "contact fl switch 3016t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3016t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3016e", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3016e", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30161.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30161.0" }, { "model": "contact fl switch 3012e-2sfx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3012e-2sfx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3012e-2fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3012e-2fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3008t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3008t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30081.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30081.0" }, { "model": "contact fl switch 3006t-2fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3006t-2fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3006t-2fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3006t-2fx sm", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3006t-2fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3006t-2fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3005t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3005t", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30051.32" }, { "model": "contact fl switch", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "30051.0" }, { "model": "contact fl switch 3004t-fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3004t-fx st", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 3004t-fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.32" }, { "model": "contact fl switch 3004t-fx", "scope": "eq", "trust": 0.3, "vendor": "phoenix", "version": "1.0" }, { "model": "contact fl switch 4824e-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4808e-16fx-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4808e-16fx st-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4808e-16fx sm-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4808e-16fx sm st-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4808e-16fx sm lc-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4800e-24fx-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4800e-24fx sm-4gc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4012t-2gt-2fx st", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4012t 2gt 2fx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4008t-2sfp", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4008t-2gt-4fx sm", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4008t-2gt-3fx sm", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 4000t-8poe-2sfp-r", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3016t", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3016e", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "30161.34" }, { "model": "contact fl switch 3012e-2sfx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3012e-2fx sm", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3008t", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "30081.34" }, { "model": "contact fl switch 3006t-2fx sm", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3006t-2fx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3005t", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "30051.34" }, { "model": "contact fl switch 3004t-fx st", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch 3004t-fx", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": "contact fl switch -4804g8ce-16fx lc", "scope": "ne", "trust": 0.3, "vendor": "phoenix", "version": "1.34" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3005", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016e", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3016t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2sfp", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2gt 4fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4008t 2gt 3fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx lc 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm st 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3005t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx st 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4808e 16fx sm lc 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4012t 2gt 2fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4012t 2gt 2fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4824e 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4800e 24fx 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4800e 24fx sm 4gc", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3012e 2fx sm", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 4000t 8poe 2sfp r", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3004t fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3004t fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3008", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3008t", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3006t 2fx st", "version": "*" }, { "model": null, "scope": "eq", "trust": 0.2, "vendor": "fl switch 3012e 2sfx", "version": "*" } ], "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "BID", "id": "104231" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3004t-fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3004t-fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3005_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3005t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3006t-2fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3008_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3008t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3012e-2sfx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016e_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_3016t_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4008t-2sfp_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:phoenixcontact:fl_switch_4824e-4gc_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005112" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "ERT@VDE working with Vyacheslav Moskvin, Semen Sokolov, Evgeniy Druzhinin, Georgy Zaytsev and Ilya Karpov of Positive Technologies and PHOENIX CONTACT.", "sources": [ { "db": "BID", "id": "104231" } ], "trust": 0.3 }, "cve": "CVE-2018-10730", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CVE-2018-10730", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "CNVD-2018-10151", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "IVD", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.0, "id": "e2effbc0-39ab-11e9-986e-000c29342cb1", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.2, "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.9 [IVD]" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.3, "id": "CVE-2018-10730", "impactScore": 6.0, "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "trust": 1.8, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2018-10730", "trust": 1.0, "value": "CRITICAL" }, { "author": "NVD", "id": "CVE-2018-10730", "trust": 0.8, "value": "Critical" }, { "author": "CNVD", "id": "CNVD-2018-10151", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201805-518", "trust": 0.6, "value": "CRITICAL" }, { "author": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1", "trust": 0.2, "value": "CRITICAL" } ] } ], "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNNVD", "id": "CNNVD-201805-518" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection. PhoenixContact is a German provider of industrial automation, connectivity and interface solutions for critical infrastructure applications such as communications, critical manufacturing and information technology. PhoenixContactmanagedFLSWITCH has a command injection vulnerability. If the configuration file can be transferred to the switch or transferred from the switch, the attacker can upgrade the firmware to execute any OSshell command. An OS command-execution vulnerability\n2. An information-disclosure vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAttackers can exploit these issues to execute arbitrary code, execute arbitrary OS commands, obtain sensitive information, and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition", "sources": [ { "db": "NVD", "id": "CVE-2018-10730" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "BID", "id": "104231" }, { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" } ], "trust": 2.61 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2018-10730", "trust": 3.5 }, { "db": "CERT@VDE", "id": "VDE-2018-004", "trust": 3.0 }, { "db": "ICS CERT", "id": "ICSA-18-137-02", "trust": 2.7 }, { "db": "BID", "id": "104231", "trust": 1.3 }, { "db": "CNVD", "id": "CNVD-2018-10151", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201805-518", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2018-005112", "trust": 0.8 }, { "db": "IVD", "id": "E2EFFBC0-39AB-11E9-986E-000C29342CB1", "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "BID", "id": "104231" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNNVD", "id": "CNNVD-201805-518" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "id": "VAR-201805-0723", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" } ], "trust": 1.60208335 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "ICS", "Network device" ], "sub_category": null, "trust": 0.6 }, { "category": [ "ICS" ], "sub_category": null, "trust": 0.2 } ], "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" } ] }, "last_update_date": "2024-11-23T22:17:30.174000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "\u30c8\u30c3\u30d7\u30da\u30fc\u30b8", "trust": 0.8, "url": "https://www.phoenixcontact.com/online/portal/jp" }, { "title": "Patch for the PhoenixContactmanagedFLSWITCH command injection vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/130053" }, { "title": "FL SWITCH 3xxx , 4xxx and 48xxx Series Product Command Injection Vulnerability Fixes", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=83450" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNNVD", "id": "CNNVD-201805-518" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-78", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "trust": 2.7, "url": "https://ics-cert.us-cert.gov/advisories/icsa-18-137-02" }, { "trust": 1.0, "url": "http://www.securityfocus.com/bid/104231" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10730" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2018-10730" }, { "trust": 0.3, "url": "https://www.phoenixcontact.com/online/portal/pc" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "BID", "id": "104231" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNNVD", "id": "CNNVD-201805-518" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" }, { "db": "BID", "id": "104231" }, { "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "db": "CNNVD", "id": "CNNVD-201805-518" }, { "db": "NVD", "id": "CVE-2018-10730" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-23T00:00:00", "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "date": "2018-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2018-10151" }, { "date": "2018-05-17T00:00:00", "db": "BID", "id": "104231" }, { "date": "2018-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "date": "2018-05-17T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-518" }, { "date": "2018-05-17T19:29:00.400000", "db": "NVD", "id": "CVE-2018-10730" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-05-23T00:00:00", "db": "CNVD", "id": "CNVD-2018-10151" }, { "date": "2018-05-17T00:00:00", "db": "BID", "id": "104231" }, { "date": "2018-07-06T00:00:00", "db": "JVNDB", "id": "JVNDB-2018-005112" }, { "date": "2018-05-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201805-518" }, { "date": "2024-11-21T03:41:56.450000", "db": "NVD", "id": "CVE-2018-10730" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-518" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Phoenix Contact managed FL SWITCH Command injection vulnerability", "sources": [ { "db": "IVD", "id": "e2effbc0-39ab-11e9-986e-000c29342cb1" }, { "db": "CNVD", "id": "CNVD-2018-10151" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "operating system commend injection", "sources": [ { "db": "CNNVD", "id": "CNNVD-201805-518" } ], "trust": 0.6 } }
gsd-2018-10730
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2018-10730", "description": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.", "id": "GSD-2018-10730" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2018-10730" ], "details": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.", "id": "GSD-2018-10730", "modified": "2023-12-13T01:22:41.179634Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10730", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "name": "https://cert.vde.com/de-de/advisories/vde-2018-004", "refsource": "CONFIRM", "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "name": "104231", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104231" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartExcluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" }, { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.33", "versionStartIncluding": "1.0", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10730" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-78" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/de-de/advisories/vde-2018-004", "refsource": "CONFIRM", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert.vde.com/de-de/advisories/vde-2018-004" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02" }, { "name": "104231", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104231" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.3, "impactScore": 6.0 } }, "lastModifiedDate": "2018-06-19T15:26Z", "publishedDate": "2018-05-17T19:29Z" } } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.