// For flags

CVE-2021-33541

Phoenix Contact: ILC1x Industrial controllers affected by Denial-of-Service vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected.

Phoenix Contact Classic Line Controllers ILC1x0 e ILC1x1 en todas sus versiones/variantes están afectados por una vulnerabilidad de denegación de servicio. Los protocolos de comunicación y el acceso al dispositivo no cuentan con medidas de autenticación. Unos atacantes remotos pueden usar paquetes IP especialmente diseñados para causar una denegación de servicio en el módulo de comunicación de red del PLC. Un ataque con éxito detiene toda la comunicación de red. Para restablecer la conectividad de la red es necesario reiniciar el dispositivo. La tarea de automatización no está afectada

*Credits: This vulnerability was discovered by the Industrial Control Security Laboratory of Qi An Xin Technology Group Inc. from China and reported to CERT@VDE. PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-05-24 CVE Reserved
  • 2021-06-25 CVE Published
  • 2024-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-770: Allocation of Resources Without Limits or Throttling
CAPEC
References (1)
URL Tag Source
https://cert.vde.com/en-us/advisories/vde-2021-019 Third Party Advisory
URL Date SRC
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Phoenixcontact
Search vendor "Phoenixcontact"
Ilc1x0 Firmware
Search vendor "Phoenixcontact" for product "Ilc1x0 Firmware"
*-
Affected
in Phoenixcontact
Search vendor "Phoenixcontact"
Ilc1x0
Search vendor "Phoenixcontact" for product "Ilc1x0"
--
Safe
Phoenixcontact
Search vendor "Phoenixcontact"
Ilc1x1 Firmware
Search vendor "Phoenixcontact" for product "Ilc1x1 Firmware"
*-
Affected
in Phoenixcontact
Search vendor "Phoenixcontact"
Ilc1x1
Search vendor "Phoenixcontact" for product "Ilc1x1"
--
Safe