#VU18691 Session Fixation in Phoenix Contact GmbH products - CVE-2019-9744
Published: June 6, 2019 / Updated: June 13, 2019
Vulnerability identifier: #VU18691
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-9744
CWE-ID: CWE-384
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
FL NAT SMCS 8TX
FL NAT SMN 8TX
FL NAT SMN 8TX-M-DMG
FL NAT SMN 8TX-M
FL NAT SMCS 8TX
FL NAT SMN 8TX
FL NAT SMN 8TX-M-DMG
FL NAT SMN 8TX-M
Software vendor:
Phoenix Contact GmbH
Phoenix Contact GmbH
Description
The vulnerability allows a remote attacker to gain unauthorized access to the web interface.
The vulnerability exists due to improper access restrictions when attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier. A remote unauthorized attacker can get access to the web interface, which may allow full access to the device configuration.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
Phoenix Contact recommends to:
- operate the devices in closed networks or protected with a suitable firewall
- Log off from the WEB-UI immediately after administration.
- Disable the WEB-UI and use configuration access via SNMP instead.
- Ensure the system password is strong as this is also the SNMP write community.