Summary
Detail | |||
---|---|---|---|
Vendor | Phoenixcontact | First view | 2018-01-12 |
Product | Fl Switch 4012t 2gt 2fx Firmware | Last view | 2019-05-07 |
Version | * | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2019-05-07 | CVE-2018-13994 | The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections. |
8.8 | 2019-05-07 | CVE-2018-13993 | The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF. |
9.8 | 2019-05-07 | CVE-2018-13992 | The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default. |
5.3 | 2019-05-07 | CVE-2018-13991 | The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images. |
9.8 | 2019-05-06 | CVE-2018-13990 | The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts. |
9 | 2018-05-17 | CVE-2018-10731 | All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728). |
9.1 | 2018-05-17 | CVE-2018-10730 | All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection. |
5.3 | 2018-05-17 | CVE-2018-10729 | All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 allow reading the configuration file by an unauthenticated user. |
8.1 | 2018-05-17 | CVE-2018-10728 | All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731). |
9.8 | 2018-01-12 | CVE-2017-16743 | An Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device. |
5.3 | 2018-01-12 | CVE-2017-16741 | An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
30% (3) | CWE-200 | Information Exposure |
20% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
10% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
10% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
10% (1) | CWE-311 | Missing Encryption of Sensitive Data |
10% (1) | CWE-287 | Improper Authentication |
10% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |