In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.

Project Subscriptions

Vendors Products
Phoenixcontact Subscribe
Fl Nat Smn 8tx Subscribe
Fl Nat Smn 8tx-m Subscribe
Fl Nat Smn 8tx-m Firmware Subscribe
Fl Nat Smn 8tx Firmware Subscribe
Fl Switch Smcs 14tx\/2fx Subscribe
Fl Switch Smcs 14tx\/2fx-sm Subscribe
Fl Switch Smcs 14tx\/2fx-sm Firmware Subscribe
Fl Switch Smcs 14tx\/2fx Firmware Subscribe
Fl Switch Smcs 16tx Subscribe
Fl Switch Smcs 16tx Firmware Subscribe
Fl Switch Smcs 4tx-pn Subscribe
Fl Switch Smcs 4tx-pn Firmware Subscribe
Fl Switch Smcs 6gt\/2sfp Subscribe
Fl Switch Smcs 6gt\/2sfp Firmware Subscribe
Fl Switch Smcs 6tx\/2sfp Subscribe
Fl Switch Smcs 6tx\/2sfp Firmware Subscribe
Fl Switch Smcs 8gt Subscribe
Fl Switch Smcs 8gt Firmware Subscribe
Fl Switch Smcs 8tx Subscribe
Fl Switch Smcs 8tx-pn Subscribe
Fl Switch Smcs 8tx-pn Firmware Subscribe
Fl Switch Smcs 8tx Firmware Subscribe
Fl Switch Smn 6tx\/2fx Subscribe
Fl Switch Smn 6tx\/2fx Firmware Subscribe
Fl Switch Smn 6tx\/2fx Sm Subscribe
Fl Switch Smn 6tx\/2fx Sm Firmware Subscribe
Fl Switch Smn 6tx\/2pof-pn Subscribe
Fl Switch Smn 6tx\/2pof-pn Firmware Subscribe
Fl Switch Smn 8tx-pn Subscribe
Fl Switch Smn 8tx-pn Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-8414 In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.
Fixes

Solution

No solution given by the vendor.


Workaround

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to the Phoenix Contact application note: Measures to protect network-capable devices with Ethernet connection https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2024-09-17T02:17:13.899Z

Reserved: 2020-12-17T00:00:00

Link: CVE-2021-21005

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-25T19:15:08.797

Modified: 2024-11-21T05:47:23.300

Link: CVE-2021-21005

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses