Back to overview

PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices

VDE-2022-018
Last update
05/11/2022 16:20
Published at
05/11/2022 16:20
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2022-018
CSAF Document

Summary

Multiple vulnerabilities have been discovered in the firmware and in libraries utilized of RAD-ISM-900-EN-BD devices:

In addition to the above listed CVEs the following issues were identified:

Vulnerabilities related to outdated libraries:

BusyBox version 0.60.1: A CVE scan revealed 13 potential vulnerabilities. Some of these vulnerabilities impact services used by this device such as NTP and DHCP.
OpenSSL version 0.9.7-beta3: This version of OpenSSL uses deprecated ciphers and a CVE scan revealed over 87 potential vulnerabilities.
Over-privileged web application:
The web application is operated with root privileges. Therefore, if an attacker were able to achieve RCE via the web application they would be executing with the highest level of privileges.

Impact

The abovementioned vulnerabilities allow an attacker to execute arbitrary shell commands and/or upload arbitrary files to the device with root privileges.

Some software libraries compiled into the device firmware are outdated and contain known vulnerabilities. Some of those vulnerabilities may be exploitable in the device context whilst others may not have any effect as the specific vulnerable function is not used. These vulnerabilities have not been investigated in detail.

Affected Product(s)

Model no. Product name Affected versions
2900016 RAD-ISM-900-EN-BD Firmware vers:all/*
2900017 RAD-ISM-900-EN-BD-BUS Firmware vers:all/*
2901205 RAD-ISM-900-EN-BD/B Firmware vers:all/*

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Improper Validation of Integrity Check Value (CWE-354)
References

Published
09/22/2025 14:57
Weakness
Improper Input Validation (CWE-20)
References

Mitigation

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: dam-mdc.phoenixcontact.com/asset/1564...

Remediation

The family of RAD-ISM-900-EN-BD devices is end of life and will not receive updates anymore. If operation within a secured environment cannot be ensured in the specific customer application, please contact your local PHOENIX CONTACT support to discuss alternative solutions.

Revision History

Version Date Summary
1 05/11/2022 16:20 initial revision