Vulnerability identifier: #VU18691
Vulnerability risk: High
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-384
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
FL NAT SMCS 8TX
Hardware solutions /
Routers & switches, VoIP, GSM, etc
FL NAT SMN 8TX
Hardware solutions /
Routers & switches, VoIP, GSM, etc
FL NAT SMN 8TX-M-DMG
Hardware solutions /
Routers & switches, VoIP, GSM, etc
FL NAT SMN 8TX-M
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Phoenix Contact GmbH
Description
The vulnerability allows a remote attacker to gain unauthorized access to the web interface.
The vulnerability exists due to improper access restrictions when attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier. A remote unauthorized attacker can get access to the web interface, which may allow full access to the device configuration.
Mitigation
Vulnerable software versions
FL NAT SMCS 8TX: before -
FL NAT SMN 8TX: before -
FL NAT SMN 8TX-M-DMG: before -
FL NAT SMN 8TX-M: before -
External links
https://www.securityfocus.com/bid/108576
https://cert.vde.com/de-de/advisories/vde-2019-006
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.