"-Synchronized-Data."

This commit is contained in:
CVE Team 2020-03-17 18:01:18 +00:00
parent 590a586d42
commit ebed409e97
No known key found for this signature in database
GPG Key ID: 5708902F06FEF743

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices. Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required."
"value": "An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required."
}
]
},
@ -56,6 +56,11 @@
"refsource": "CONFIRM",
"name": "https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/Security_Advirory_CVE-2018-16994.pdf",
"url": "https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/Security_Advirory_CVE-2018-16994.pdf"
},
{
"refsource": "CONFIRM",
"name": "https://psirt.bosch.com/security-advisories/bosch-sa-645125.html",
"url": "https://psirt.bosch.com/security-advisories/bosch-sa-645125.html"
}
]
}