Summary
Two vulnerabilities have been discovered in the firmware of TC ROUTER and TC CLOUD CLIENT devices.
Update A, 2024-08-12
Added a summary text
Added details to impact
Impact
CVE-2023-3526
An attacker could embed a link on a page controlled by him that includes malicious scripts and points to the license viewer page. These scripts are executed in a victim's browser when they open the page containing the vulnerable field.
CVE-2023-3569
An authenticated attacker could use the file upload function to upload a crafted XML to cause a denial of service.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1221706 | CLOUD CLIENT 1101T-TX/TX | Firmware <2.06.10 |
2702886 | TC CLOUD CLIENT 1002-4G | Firmware <2.07.2 |
2702888 | TC CLOUD CLIENT 1002-4G ATT | Firmware <2.07.2 |
2702887 | TC CLOUD CLIENT 1002-4G VZW | Firmware <2.07.2 |
2702528 | TC ROUTER 3002T-4G | Firmware <2.07.2 |
2702533 | TC ROUTER 3002T-4G ATT | Firmware <2.07.2 |
2702532 | TC ROUTER 3002T-4G VZW | Firmware <2.07.2 |
Vulnerabilities
Expand / Collapse allIn PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser.
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.
Mitigation
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note.
Measures to protect network-capable devices with Ethernet connection
Remediation
Phoenix Contact strongly recommends updating to the latest available firmware version, which fixes these vulnerabilities.
Revision History
Version | Date | Summary |
---|---|---|
1 | 08.08.2023 06:00 | Initial revision. |
2 | 12.08.2024 12:00 | Update A |
3 | 22.05.2025 15:03 | Fix: quotation mark |