An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 03:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://psirt.bosch.com/security-advisories/bosch-sa-645125.html - | |
References | () https://www.phoenixcontact.com/assets/downloads_ed/local_pc/web_dwl_technical_info/Security_Advirory_CVE-2018-16994.pdf - Vendor Advisory |
Information
Published : 2020-02-18 23:15
Updated : 2024-11-21 03:53
NVD link : CVE-2018-16994
Mitre link : CVE-2018-16994
CVE.ORG link : CVE-2018-16994
JSON object : View
Products Affected
phoenixcontact
- axl_f_bk_eth_firmware
- axl_f_bk_eth_xc_firmware
- axl_f_bk_eth
- axl_f_bk_pn
- axl_f_bk_pn_firmware
- axl_f_bk_eth_xc
CWE