No analysis available yet.
Vendor Solution
Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0 LTS or higher which fixes these vulnerabilities.
Vendor Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-4823 | On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system services or a complete reboot. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2020-049 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-17T04:14:26.064Z
Reserved: 2020-04-30T00:00:00.000Z
Link: CVE-2020-12521
No data.
Status : Modified
Published: 2020-12-17T23:15:13.137
Modified: 2024-11-21T04:59:51.477
Link: CVE-2020-12521
No data.
OpenCVE Enrichment
No data.
EUVD