2023-08-08 08:00:30 +00:00
{
"id" : "CVE-2023-3526" ,
"sourceIdentifier" : "info@cert.vde.com" ,
"published" : "2023-08-08T07:15:10.150" ,
2023-08-14 20:00:43 +00:00
"lastModified" : "2023-08-14T19:15:13.410" ,
2023-08-11 23:55:31 +00:00
"vulnStatus" : "Modified" ,
2023-08-08 08:00:30 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 9.6 ,
"baseSeverity" : "CRITICAL"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 6.0
}
]
} ,
"weaknesses" : [
{
"source" : "info@cert.vde.com" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-79"
}
]
}
] ,
2023-08-10 18:00:39 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:cloud_client_1101t-tx_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.06.10" ,
"matchCriteriaId" : "F27D7C23-5F63-42C6-AEC8-B3033693B91E"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:cloud_client_1101t-tx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1B6CD87A-C42B-4452-BCE8-87AAC75A07A0"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_att_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "B4EC6E85-D2D8-4D8B-86E5-FF50BAD5584F"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g_att:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "98C24755-6451-49AD-8DD6-2A4A20E42E06"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "8294FF44-17CF-45B3-BCAD-D334AF4001FA"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C42AB40F-8156-4C5C-86DC-8F10E6C70F4D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_cloud_client_1002-4g_vzw_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "C3133D1F-7110-411B-B242-A5F58F2CBB47"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_cloud_client_1002-4g_vzw:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F6480AF5-913F-4D2E-879F-149B25513093"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_att_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "18E45B91-E395-4F80-AD9E-6993C881BDEE"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g_att:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9C2CB341-1DD5-4A74-A6D4-5AA7F01E50BD"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "E4FD4A8A-5B20-4467-A8C5-DB8CAE10B78D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "34273B74-2964-4DDF-B464-6D312528366B"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:phoenixcontact:tc_router_3002t-4g_vzw_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.07.2" ,
"matchCriteriaId" : "88EA471C-672E-4DD0-B0C9-2E5E7C695774"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:phoenixcontact:tc_router_3002t-4g_vzw:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA9B96D9-DBCD-4858-94B1-CFE5AF2DD35E"
}
]
}
]
}
] ,
2023-08-08 08:00:30 +00:00
"references" : [
2023-08-14 20:00:43 +00:00
{
"url" : "http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html" ,
"source" : "info@cert.vde.com"
} ,
2023-08-11 23:55:31 +00:00
{
"url" : "http://seclists.org/fulldisclosure/2023/Aug/12" ,
"source" : "info@cert.vde.com"
} ,
2023-08-08 08:00:30 +00:00
{
"url" : "https://cert.vde.com/en/advisories/VDE-2023-017" ,
2023-08-10 18:00:39 +00:00
"source" : "info@cert.vde.com" ,
"tags" : [
"Third Party Advisory"
]
2023-08-08 08:00:30 +00:00
}
]
}