No analysis available yet.
Vendor Solution
Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0.5 LTS or higher which fixes this vulnerability.
Vendor Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21220 | Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests. |
| Link | Providers |
|---|---|
| https://cert.vde.com/en/advisories/VDE-2021-029/ |
|
No history.
Subscriptions
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T22:09:31.616Z
Reserved: 2021-06-10T00:00:00.000Z
Link: CVE-2021-34570
No data.
Status : Modified
Published: 2021-09-27T09:15:07.750
Modified: 2024-11-21T06:10:43.373
Link: CVE-2021-34570
No data.
OpenCVE Enrichment
No data.
EUVD