SB2019012510 - Multiple vulnerabilities in PHOENIX CONTACT FL SWITCH
Published: January 25, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 6 secuirty vulnerabilities.
1) Cross-site request forgery (CVE-ID: CVE-2018-13993)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
2) Security restrictions bypass (CVE-ID: CVE-2018-13990)
The vulnerability allows a remote attacker to bypass security restrictions.
The vulnerability exists due to lack of a login time-out feature to prevent high-speed automated username and password combination guessing. A remote attacker can conduct brute forcing attack against usernames and passwords and bypass security restrictions.
3) Information disclosure (CVE-ID: CVE-2018-13992)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to default setting of the Web UI (HTTP) allows user credentials to be transmitted unencrypted. A remote attacker can gain access to these credentials.
4) Resource exhaustion (CVE-ID: CVE-2018-13994)
The vulnerability allows a remote attacker to cause DoS condition.
The vulnerability exists due to resource exhaustion. A remote attacker can initiate a web denial-of-service attack by producing an excessive number of Web UI connections.
5) Information disclosure (CVE-ID: CVE-2018-13991)
The vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability exists due to insecure storage of sensitive information. A remote attacker can extract the switch’s default private keys from its firmware image.
6) Out-of-bounds read (CVE-ID: CVE-2017-3735)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to one-byte out-of-bounds read when parsing an IPAddressFamily extension in an X.509 certificate. A remote attacker can disguise text display of the certificate.
Remediation
Install update from vendor's website.