Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2021-21220 | Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests. |
Solution
Phoenix Contact recommends affected users to upgrade to the current Firmware 2021.0.5 LTS or higher which fixes this vulnerability.
Workaround
Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our application note: Measures to protect network-capable devices with Ethernet connection
Link | Providers |
---|---|
https://cert.vde.com/en/advisories/VDE-2021-029/ |
![]() ![]() |
No history.

Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2024-09-16T22:09:31.616Z
Reserved: 2021-06-10T00:00:00
Link: CVE-2021-34570

No data.

Status : Modified
Published: 2021-09-27T09:15:07.750
Modified: 2024-11-21T06:10:43.373
Link: CVE-2021-34570

No data.

No data.