#VU12814 Information disclosure in Phoenix Contact GmbH products - CVE-2018-10729
Published: May 18, 2018
Vulnerability identifier: #VU12814
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-10729
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
FL SWITCH 4000T-8POE-2SFP-R
FL SWITCH 3012E-2FX SM
FL SWITCH 4800E-24FX SM-4GC
FL SWITCH 4800E-24FX-4GC
FL SWITCH 4824E-4GC
FL SWITCH 4012T-2GT-2FX ST
FL SWITCH 4012T 2GT 2FX
FL SWITCH 4808E-16FX SM LC-4GC
FL SWITCH 4808E-16FX-4GC
FL SWITCH 4808E-16FX ST-4GC
FL SWITCH 4808E-16FX SM ST-4GC
FL SWITCH 4808E-16FX SM-4GC
FL SWITCH 4808E-16FX LC-4GC
FL SWITCH 4008T-2GT-3FX SM
FL SWITCH 4008T-2GT-4FX SM
FL SWITCH 4008T-2SFP
FL SWITCH 3006T-2FX SM
FL SWITCH 3016T
FL SWITCH 3016
FL SWITCH 3016E
FL SWITCH 3012E-2SFX
FL SWITCH 3006T-2FX ST
FL SWITCH 3006T-2FX
FL SWITCH 3008T
FL SWITCH 3008
FL SWITCH 3004T-FX ST
FL SWITCH 3004T-FX
FL SWITCH 3005T
FL SWITCH 3005
FL SWITCH 4000T-8POE-2SFP-R
FL SWITCH 3012E-2FX SM
FL SWITCH 4800E-24FX SM-4GC
FL SWITCH 4800E-24FX-4GC
FL SWITCH 4824E-4GC
FL SWITCH 4012T-2GT-2FX ST
FL SWITCH 4012T 2GT 2FX
FL SWITCH 4808E-16FX SM LC-4GC
FL SWITCH 4808E-16FX-4GC
FL SWITCH 4808E-16FX ST-4GC
FL SWITCH 4808E-16FX SM ST-4GC
FL SWITCH 4808E-16FX SM-4GC
FL SWITCH 4808E-16FX LC-4GC
FL SWITCH 4008T-2GT-3FX SM
FL SWITCH 4008T-2GT-4FX SM
FL SWITCH 4008T-2SFP
FL SWITCH 3006T-2FX SM
FL SWITCH 3016T
FL SWITCH 3016
FL SWITCH 3016E
FL SWITCH 3012E-2SFX
FL SWITCH 3006T-2FX ST
FL SWITCH 3006T-2FX
FL SWITCH 3008T
FL SWITCH 3008
FL SWITCH 3004T-FX ST
FL SWITCH 3004T-FX
FL SWITCH 3005T
FL SWITCH 3005
Software vendor:
Phoenix Contact GmbH
Phoenix Contact GmbH
Description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the target system.
The weakness exists due to Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. A remote attacker can submit a web login request can expose the contents of this file through to the web browser.
The weakness exists due to Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. A remote attacker can submit a web login request can expose the contents of this file through to the web browser.
Remediation
Update to version 1.34 or later.