This vulnerability was discovered by Richard Thomas and Tom Chothia of University of Birmingham.
Article No° | Product Name | Affected Version(s) |
---|---|---|
1050387 | BTP 2043W | all versions |
1046666 | BTP 2070W | all versions |
1046667 | BTP 2102W | all versions |
Uncontrolled Resource Consumption can be exploited to cause the HMI to become unresponsive and not accurately update the display content (Denial of Service).
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).
When the HMI is subjected to i.e. a rapid flood of ICMP ping packets, the HMI stops responding to user input and the running program provides no visual changes. Once the attack stops, the HMI will return to normal functionality.
Mitigation
Phoenix Contact recommends operating network-capable devices in closed networks or
protected with a suitable firewall. For detailed information on the recommendations for measures
to protect network-capable devices, please refer to the Phoenix Contact application note:
Measures to protect network-capable devices with Ethernet connection
This vulnerability was discovered by Richard Thomas and Tom Chothia of University of Birmingham.