
CVE-2021-33540 – Phoenix Contact: Undocumented FTP acces in certain AXL F BK and IL BK devices
https://notcve.org/view.php?id=CVE-2021-33540
25 Jun 2021 — In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists. En determinados dispositivos de las familias de productos Phoenix Contact AXL F BK e IL BK se presenta un acceso FTP protegido por contraseña no documentado al directorio root • https://cert.vde.com/en-us/advisories/vde-2021-021 • CWE-798: Use of Hard-coded Credentials •

CVE-2021-21005 – Race Condition Vulnerability in Phoenix Contact FL SWITCH SMCS series products
https://notcve.org/view.php?id=CVE-2021-21005
25 Jun 2021 — In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards. En los productos de la serie Phoenix Contact FL SWITCH SMCS en múltiples versiones, si un atacante envía un paquete TCP diseñado a mano con el Urgent-Flag ajustado y el Urgent-Pointer ajustado en 0, la pila de red se bloqueará. El dispositivo debe ser reiniciado... • https://cert.vde.com/en-us/advisories/vde-2021-023 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2021-21004 – Cross-site Scripting Vulnerability in Phoenix Contact FL SWITCH SMCS series products
https://notcve.org/view.php?id=CVE-2021-21004
25 Jun 2021 — In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client. En los productos de la serie Phoenix Contact FL SWITCH SMCS en múltiples versiones, un atacante puede insertar código malicioso por medio de tramas LLDP en la administración basada en la web, que luego podría ser ejecutado por el cliente • https://cert.vde.com/en-us/advisories/vde-2021-023 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2021-21003 – Denial of Service Vulnerability in Phoenix Contact FL SWITCH SMCS series products
https://notcve.org/view.php?id=CVE-2021-21003
25 Jun 2021 — In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may cause a Denial of Service of Web-, SNMP- and ICMP-Echo services. The switching functionality of the device is not affected. En los productos de la serie Phoenix Contact FL SWITCH SMCS en múltiples versiones, los paquetes TCP fragmentados pueden causar una denegación de servicio de los servicios Echo web, SNMP e ICMP. La funcionalidad switching del dispositivo no está afectada • https://cert.vde.com/en-us/advisories/vde-2021-023 • CWE-404: Improper Resource Shutdown or Release •

CVE-2021-21002 – Denial of Service in Phoenix Contact FL COMSERVER UNI products
https://notcve.org/view.php?id=CVE-2021-21002
25 Jun 2021 — In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead to a temporary denial of service. En Phoenix Contact FL COMSERVER UNI en versiones anteriores a 2.40, una respuesta de excepción Modbus no válida puede conllevar a una denegación de servicio temporal • https://cert.vde.com/en-us/advisories/vde-2021-022 • CWE-772: Missing Release of Resource after Effective Lifetime •

CVE-2020-12523 – Phoenix Contact mGuard Devices versions before 8.8.3: LAN ports get functional after reboot even if they are disabled in the device configuration
https://notcve.org/view.php?id=CVE-2020-12523
17 Dec 2020 — On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource En Phoenix Contact mGuard Devices versiones anteriores a 8.8.3, los puertos LAN funcionan después del reinicio, inclusiv... • https://cert.vde.com/en-us/advisories/vde-2020-046 • CWE-909: Missing Initialization of Resource •

CVE-2020-12521 – Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS: A specially crafted LLDP packet may lead to a high system load in the PROFINET stack.
https://notcve.org/view.php?id=CVE-2020-12521
17 Dec 2020 — On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un paquete LLDP especialmente diseñado puede conllevar a una alta carga del sistema en la pila PROFINET. Un atacante puede causar un fallo en los servicios del sistema o un reinicio completo • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-20: Improper Input Validation •

CVE-2020-12519 – Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS: An attacker can use this vulnerability i.e. to open a reverse shell with root privileges.
https://notcve.org/view.php?id=CVE-2020-12519
17 Dec 2020 — On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un atacante puede utilizar esta vulnerabilidad, es decir, para abrir un shell inverso con privilegios root • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-269: Improper Privilege Management •

CVE-2020-12518 – Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS: An attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.
https://notcve.org/view.php?id=CVE-2020-12518
17 Dec 2020 — On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks. En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un atacante puede utilizar los conocimientos adquiridos al leer la información confidencial que no está suficientemente protegida para planificar futuros ataques • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2020-12517 – Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS: An authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation).
https://notcve.org/view.php?id=CVE-2020-12517
17 Dec 2020 — On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vulnerable website (local privilege escalation). En Phoenix Contact PLCnext Control Devices versiones anteriores a 2021.0 LTS, un usuario autenticado poco privilegiado podría insertar código Javascript malicioso para alcanzar derechos de administrador cuando el usuario administrador visita el sitio web vulnerable ... • https://cert.vde.com/en-us/advisories/vde-2020-049 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •