Zurück zur Übersicht

PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L

VDE-2020-026
Last update
22.05.2025 15:03
Published at
20.08.2020 09:11
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2020-026
CSAF Document

Summary

A timeout during a TLS handshake can result in the connection failing to terminate. This can result in a Niagara thread hanging and requires a manual restart to correct.

Impact

Successful exploitation of this vulnerability could result in a denial-of-service condition.

Affected Product(s)

Model no. Product name Affected versions
Hardware ILC 2050 BI Firmware <=1.3.0
Hardware ILC 2050 BI-L Firmware <=1.3.0
Software Emalytics Automation Workbench N4 Firmware <=1.3.0

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:58
Weakness
Synchronous Access of Remote Resource without Timeout (CWE-1088)
References

Mitigation

Phoenix Contact recommends customers with affected products take the following steps to protect themselves:

• Review and validate the list of users who are authorized and who can authenticate to Emalytics.

• Allow only trained and trusted persons to have physical access to the system, including devices that have connection to the system though the Ethernet port.

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note:

Art.-Nr. 107913: AH EN INDUSTRIAL SECURITY 'Measures to protect network-capable devices with Ethernet connection against unauthorized access'

Revision History

Version Date Summary
1 20.08.2020 09:11 Initial revision.
2 06.11.2024 12:27 Fix: correct certvde domain, added self-reference
3 22.05.2025 15:03 Fix: version space, added distribution, quotation mark