Article No° | Product Name | Affected Version(s) |
---|---|---|
Phoenix Contact AXL F BK EIP | <= 1.30 | |
Phoenix Contact AXL F BK EIP EF | <= 1.30 | |
Phoenix Contact AXL F BK EIP XC | <= 1.30 | |
Phoenix Contact AXL F BK ETH | <= 1.31 | |
Phoenix Contact AXL F BK ETH XC | <= 1.31 | |
Phoenix Contact AXL F BK PN (discontinued) | <= 1.06 | |
Phoenix Contact AXL F BK PN TPS | <= 1.33 | |
Phoenix Contact AXL F BK PN TPS XC | <= 1.33 | |
Phoenix Contact AXL F BK PN XC (discontinued) | <= 1.06 | |
Phoenix Contact AXL F BK SAS (discontinued) | <= 1.35 | |
Phoenix Contact IL EIP BK DI8 DO4 2TX-PAC | <= 1.12 | |
Phoenix Contact IL ETH BK DI8 DO4 2TX-PAC | <= 1.42 | |
Phoenix Contact IL ETH BK-PAC | <= 1.00 | |
Phoenix Contact IL PN BK-PAC | <= 1.13 |
A denial of service (DoS) attack targeting port 80 (http service) can overload the device (CWE-770). This behaviour has been observed when running network security scanners.
An unauthenticated remote attacker can cause a Denial of Service by sending a large number of requests to the http service on port 80.
A successful attack leads to an overload of the device and the hardware watchdog is triggered. Process data behaves according to the configured substitute value behavior.
The bus coupler requires a manual restart (resetting the power supply, pressing the reset button or executing the SNMP reset command) to reestablish communication within the Industrial Ethernet (e.g. PROFINET IO, Modbus/TCP, EtherNet/IP).
General Recommendations
For general information and recommendations on security measures to protect network-enabled devices, refer to the application note: Application Note Security.
Mitigation
Affected bus couplers are designed and developed for the use in closed industrial networks. Phoenix Contact therefore strongly recommends using the devices exclusively in closed networks and protected by a suitable firewall.
If the use of scanners is mandatory for network security in closed production networks, it is recommended to exclude or disable denial of service tests that target port 80. Most network scanners offer options to individually disable certain tests or to apply exclusions by clustering device types and test categorization functions.
Remediation
To further improve security, fixed firmware versions are available for the items listed in the "Fixed" section. A fix for products marked as "discontinued" is not planned. All other listed products will receive a bugfix at the next revision.
Fixed:
CERT@VDE coordinated with Phoenix Contact GmbH & Co. KG