Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-8413 | In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client. |
Solution
No solution given by the vendor.
Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note: Measures to protect network-capable devices with Ethernet connection https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf
| Link | Providers |
|---|---|
| https://cert.vde.com/en-us/advisories/vde-2021-023 |
|
No history.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T22:08:28.813Z
Reserved: 2020-12-17T00:00:00
Link: CVE-2021-21004
No data.
Status : Modified
Published: 2021-06-25T19:15:08.730
Modified: 2024-11-21T05:47:23.160
Link: CVE-2021-21004
No data.
OpenCVE Enrichment
No data.
EUVD