VDE-2019-006
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2019-03-25 11:40 - Updated: 2025-05-14 12:28Summary
PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx
Notes
Summary: After login the source IP is used as the session identifier, so that users sharing the same source IP are able to gain full authenticated access to the WEB-UI.
The access attempt will only be successful if the former authorized session has not been terminated by the authorized user or by session timeout.
Impact: If an unauthorized user manages to get access as described above, he gains full access to the device configuration.
Mitigation: Customers using Phoenix Contact FL NAT SMx devices are recommended to operate the devices in closed networks or protected with a suitable firewall.\
For detailed information on our recommendations for measures to protect network-capable devices, please refer to the [application note:](https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/ah_en_industrial_security_107913_en_01.pdf)
To protect the device from an attacker who has gained access to the closed network, or if there is a possibility that multiple users might share a VPN connection with a single endpoint IP, it might be considered to:
log off from the WEB-UI immediately after administration\
disable the WEB-UI and use configuration access via SNMP instead
An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.
8.8 (High)
Mitigation
Customers using Phoenix Contact FL NAT SMx devices are recommended to operate the devices in closed networks or protected with a suitable firewall.\
For detailed information on our recommendations for measures to protect network-capable devices, please refer to the [application note:](https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/ah_en_industrial_security_107913_en_01.pdf)
To protect the device from an attacker who has gained access to the closed network, or if there is a possibility that multiple users might share a VPN connection with a single endpoint IP, it might be considered to:
log off from the WEB-UI immediately after administration\
disable the WEB-UI and use configuration access via SNMP instead
References
Acknowledgments
CERT@VDE
certvde.com
Maxim Rupp
rupp.it/
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"organization": "Maxim Rupp",
"summary": "reporting",
"urls": [
"https://rupp.it/"
]
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "After login the source IP is used as the session identifier, so that users sharing the same source IP are able to gain full authenticated access to the WEB-UI.\n\nThe access attempt will only be successful if the former authorized session has not been terminated by the authorized user or by session timeout.",
"title": "Summary"
},
{
"category": "description",
"text": "If an unauthorized user manages to get access as described above, he gains full access to the device configuration.",
"title": "Impact"
},
{
"category": "description",
"text": "Customers using Phoenix Contact FL NAT SMx devices are recommended to operate the devices in closed networks or protected with a suitable firewall.\\\nFor detailed information on our recommendations for measures to protect network-capable devices, please refer to the [application note:](https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/ah_en_industrial_security_107913_en_01.pdf)\n\nTo protect the device from an attacker who has gained access to the closed network, or if there is a possibility that multiple users might share a VPN connection with a single endpoint IP, it might be considered to:\n\nlog off from the WEB-UI immediately after administration\\\ndisable the WEB-UI and use configuration access via SNMP instead",
"title": "Mitigation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Phoenix Contact",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact"
},
{
"category": "self",
"summary": "VDE-2019-006: PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx - HTML",
"url": "https://certvde.com/en/advisories/VDE-2019-006"
},
{
"category": "self",
"summary": "VDE-2019-006: PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2019/vde-2019-006.json"
}
],
"title": "PHOENIX CONTACT: unauthorized access to WEB-UI on FL NAT SMx",
"tracking": {
"aliases": [
"VDE-2019-006"
],
"current_release_date": "2025-05-14T12:28:19.000Z",
"generator": {
"date": "2024-08-01T11:45:03.988Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.9"
}
},
"id": "VDE-2019-006",
"initial_release_date": "2019-03-25T11:40:00.000Z",
"revision_history": [
{
"date": "2019-03-25T11:40:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2024-11-06T11:27:01.000Z",
"number": "2",
"summary": "Fix: correct certvde domain, added alias, added self-reference"
},
{
"date": "2025-05-14T12:28:19.000Z",
"number": "3",
"summary": "Fix: version term, added distribution"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "SMCS 8TX",
"product": {
"name": "FL NAT SMCS 8TX",
"product_id": "CSAFPID-11001"
}
},
{
"category": "product_name",
"name": "SMN 8TX",
"product": {
"name": "FL NAT SMN 8TX",
"product_id": "CSAFPID-11002"
}
},
{
"category": "product_name",
"name": "SMN 8TX-M",
"product": {
"name": "FL NAT SMN 8TX-M",
"product_id": "CSAFPID-11003"
}
},
{
"category": "product_name",
"name": "SMN 8TX-M-DMG",
"product": {
"name": "FL NAT SMN 8TX-M-DMG",
"product_id": "CSAFPID-11004"
}
}
],
"category": "product_family",
"name": "FL NAT"
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Firmware all versions",
"product_id": "CSAFPID-21001"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
],
"summary": "Affected products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware all versions installed on FL NAT SMCS 8TX",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware all versions installed on FL NAT SMN 8TX",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": " Firmware all versions installed on FL NAT SMN 8TX-M",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": " Firmware all versions installed on FL NAT SMN 8TX-M-DMG",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-9744",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.",
"title": "Vulnerability Description"
}
],
"product_status": {
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Customers using Phoenix Contact FL NAT SMx devices are recommended to operate the devices in closed networks or protected with a suitable firewall.\\\nFor detailed information on our recommendations for measures to protect network-capable devices, please refer to the [application note:](https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/ah_en_industrial_security_107913_en_01.pdf)\n\nTo protect the device from an attacker who has gained access to the closed network, or if there is a possibility that multiple users might share a VPN connection with a single endpoint IP, it might be considered to:\n\nlog off from the WEB-UI immediately after administration\\\ndisable the WEB-UI and use configuration access via SNMP instead",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004"
]
}
],
"title": "CVE-2019-9744"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…