Back to overview

Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers

VDE-2025-029
Last update
05/14/2025 14:28
Published at
05/13/2025 11:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2025-029
CSAF Document

Summary

A denial of service (DoS) attack targeting port 80 (http service) can overload the device (CWE-770). This behaviour has been observed when running network security scanners.

Impact

A successful attack leads to an overload of the device and the hardware watchdog is triggered. Process data behaves according to the configured substitute value behavior.

The bus coupler requires a manual restart (resetting the power supply, pressing the reset button or executing the SNMP reset command) to reestablish communication within the Industrial Ethernet (e.g. PROFINET IO, Modbus/TCP, EtherNet/IP).

Affected Product(s)

Model no. Product name Affected versions
2688394 AXL F BK EIP Firmware <= 1.30
2702782 AXL F BK EIP EF Firmware <= 1.30
1167192 AXL F BK EIP XC Firmware <= 1.30
2688459 AXL F BK ETH Firmware <= 1.31
2701949 AXL F BK ETH XC Firmware <= 1.33
2701815 AXL F BK PN Firmware <= 1.06
2403869 AXL F BK PN TPS Firmware <= 1.33
1068857 AXL F BK PN TPS XC Firmware <= 1.33
2701222 AXL F BK PN XC Firmware <= 1.06
2701457 AXL F BK SAS Firmware <= 1.35
2897758 IL EIP BK DI8 DO4 2TX-PAC Firmware <= 1.12
2703981 IL ETH BK DI8 DO4 2TX-PAC Firmware <= 1.42
2702372 IL ETH BK-PAC Firmware <= 1.00
2403696 IL PN BK-PAC Firmware <= 1.13

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:57
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
References

Mitigation

Affected bus couplers are designed and developed for the use in closed industrial networks. Phoenix Contact therefore strongly recommends using the devices exclusively in closed networks and protected by a suitable firewall.

If the use of scanners is mandatory for network security in closed production networks, it is recommended to exclude or disable denial of service tests that target port 80. Most network scanners offer options to individually disable certain tests or to apply exclusions by clustering device types and test categorization functions.

Remediation

To further improve security, fixed firmware versions are available for the items listed in the "Fixed" section. A fix for products marked as "discontinued" is not planned. All other listed products will receive a bugfix at the next revision.

Revision History

Version Date Summary
1 05/13/2025 11:00 Initial revision
2 05/14/2025 14:28 Fix: version space