{ "CVE_data_meta": { "ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-06-23T10:00:00.000Z", "ID": "CVE-2021-21003", "STATE": "PUBLIC", "TITLE": "Denial of Service Vulnerability in Phoenix Contact FL SWITCH SMCS series products" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "FL SWITCH", "version": { "version_data": [ { "version_affected": "<=", "version_name": "SMCS 16TX (2700996)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 14TX/2FX (2700997)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 14TX/2FX-SM (2701466)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 8GT (2891123)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 6GT/2SFP (2891479)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 8TX-PN (2989103)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 4TX-PN (2989093)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 8TX (2989226)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMCS 6TX/2SFP (2989323)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMN 6TX/2POF-PN (2700290)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMN 8TX-PN (2989501)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMN 6TX/2FX (2989543)", "version_value": "4.70" }, { "version_affected": "<=", "version_name": "SMN 6TX/2FX SM (2989556)", "version_value": "4.70" } ] } }, { "product_name": "FL NAT", "version": { "version_data": [ { "version_affected": "<=", "version_name": "SMN 8TX (2989365)", "version_value": "4.63" }, { "version_affected": "<=", "version_name": "SMN 8TX-M (2702443)", "version_value": "4.63" } ] } } ] }, "vendor_name": "Phoenix Contact" } ] } }, "credit": [ { "lang": "eng", "value": "This vulnerability has been discovered and reported by Anne Borcherding, Fraunhofer- Institut für Optronik, Systemtechnik und Bildauswertung IOSB. PHOENIX CONTACT thanks CERT@VDE for the coordination and support with this publication." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may cause a Denial of Service of Web-, SNMP- and ICMP-Echo services. The switching functionality of the device is not affected." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-404 Improper Resource Shutdown or Release" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert.vde.com/en-us/advisories/vde-2021-023", "refsource": "CONFIRM", "url": "https://cert.vde.com/en-us/advisories/vde-2021-023" } ] }, "source": { "advisory": "VDE-2021-023", "defect": [ "VDE-2021-023" ], "discovery": "EXTERNAL" }, "work_around": [ { "lang": "eng", "value": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note:\nMeasures to protect network-capable devices with Ethernet connection https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf" } ] }