Multiple vulnerabilities in PHOENIX CONTACT FL SWITCH



Published: 2019-01-25
Risk Low
Patch available YES
Number of vulnerabilities 6
CVE-ID CVE-2018-13993
CVE-2018-13990
CVE-2018-13992
CVE-2018-13994
CVE-2018-13991
CVE-2017-3735
CWE-ID CWE-352
CWE-307
CWE-319
CWE-400
CWE-922
CWE-125
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
FL SWITCH 4004T-8POE-4SFP
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4000T-4POE-1SFP
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3012E-2FX
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4000T-8POE-2SFP-R
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3012E-2FX SM
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4800E-24FX SM-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4800E-24FX-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4824E-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4012T-2GT-2FX ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4012T 2GT 2FX
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX SM LC-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX ST-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX SM ST-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX SM-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4808E-16FX LC-4GC
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4008T-2GT-3FX SM
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4008T-2GT-4FX SM
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 4008T-2SFP
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3006T-2FX SM
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3016T
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3016
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3016E
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3012E-2SFX
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3006T-2FX ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3006T-2FX
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3008T
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3008
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3004T-FX ST
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3004T-FX
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3005T
Hardware solutions / Routers & switches, VoIP, GSM, etc

FL SWITCH 3005
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Phoenix Contact GmbH

Security Bulletin

This security bulletin contains information about 6 vulnerabilities.

1) Cross-site request forgery

EUVDB-ID: #VU17213

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-13993

CWE-ID: CWE-352 - Cross-Site Request Forgery (CSRF)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Security restrictions bypass

EUVDB-ID: #VU17214

Risk: Low

CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-13990

CWE-ID: CWE-307 - Improper Restriction of Excessive Authentication Attempts

Exploit availability: No

Description

The vulnerability allows a remote attacker to bypass security restrictions.

The vulnerability exists due to lack of a login time-out feature to prevent high-speed automated username and password combination guessing. A remote attacker can conduct brute forcing attack against usernames and passwords and bypass security restrictions.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU17215

Risk: Low

CVSSv3.1: 7.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-13992

CWE-ID: CWE-319 - Cleartext Transmission of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to default setting of the Web UI (HTTP) allows user credentials to be transmitted unencrypted. A remote attacker can gain access to these credentials.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource exhaustion

EUVDB-ID: #VU17217

Risk: Low

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-13994

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to cause DoS condition.

The vulnerability exists due to resource exhaustion. A remote attacker can initiate a web denial-of-service attack by producing an excessive number of Web UI connections.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Information disclosure

EUVDB-ID: #VU17216

Risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-13991

CWE-ID: CWE-922 - Insecure Storage of Sensitive Information

Exploit availability: No

Description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The vulnerability exists due to insecure storage of sensitive information. A remote attacker can extract the switch’s default private keys from its firmware image.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) Out-of-bounds read

EUVDB-ID: #VU8487

Risk: Low

CVSSv3.1: 3.3 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:W/RC:C]

CVE-ID: CVE-2017-3735

CWE-ID: CWE-125 - Out-of-bounds read

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to one-byte out-of-bounds read when parsing an IPAddressFamily extension in an X.509 certificate. A remote attacker can disguise text display of the certificate.

Mitigation

Update to version 1.35 or later.

Vulnerable software versions

FL SWITCH 4004T-8POE-4SFP: All versions

FL SWITCH 4000T-4POE-1SFP: All versions

FL SWITCH 3012E-2FX: All versions

FL SWITCH 4000T-8POE-2SFP-R: All versions

FL SWITCH 3012E-2FX SM: All versions

FL SWITCH 4800E-24FX SM-4GC: All versions

FL SWITCH 4800E-24FX-4GC: All versions

FL SWITCH 4824E-4GC: All versions

FL SWITCH 4012T-2GT-2FX ST: All versions

FL SWITCH 4012T 2GT 2FX: All versions

FL SWITCH 4808E-16FX SM LC-4GC: All versions

FL SWITCH 4808E-16FX-4GC: All versions

FL SWITCH 4808E-16FX ST-4GC: All versions

FL SWITCH 4808E-16FX SM ST-4GC: All versions

FL SWITCH 4808E-16FX SM-4GC: All versions

FL SWITCH 4808E-16FX LC-4GC: All versions

FL SWITCH 4008T-2GT-3FX SM: All versions

FL SWITCH 4008T-2GT-4FX SM: All versions

FL SWITCH 4008T-2SFP: All versions

FL SWITCH 3006T-2FX SM: All versions

FL SWITCH 3016T: All versions

FL SWITCH 3016: All versions

FL SWITCH 3016E: All versions

FL SWITCH 3012E-2SFX: All versions

FL SWITCH 3006T-2FX ST: All versions

FL SWITCH 3006T-2FX: All versions

FL SWITCH 3008T: All versions

FL SWITCH 3008: All versions

FL SWITCH 3004T-FX ST: All versions

FL SWITCH 3004T-FX: All versions

FL SWITCH 3005T: All versions

FL SWITCH 3005: All versions

External links

http://cert.vde.com/de-de/advisories/vde-2019-001


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###