Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
References
Link | Resource |
---|---|
https://cert.vde.com/en/advisories/VDE-2021-029/ | Patch Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2021-029/ | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
History
21 Nov 2024, 06:10
Type | Values Removed | Values Added |
---|---|---|
References | () https://cert.vde.com/en/advisories/VDE-2021-029/ - Patch, Third Party Advisory |
Information
Published : 2021-09-27 09:15
Updated : 2024-11-21 06:10
NVD link : CVE-2021-34570
Mitre link : CVE-2021-34570
CVE.ORG link : CVE-2021-34570
JSON object : View
Products Affected
phoenixcontact
- axc_f_2152
- rfc_4072s
- plcnext_technology_starterkit_firmware
- axc_f_2152_firmware
- axc_f_2152_starterkit
- axc_f_2152_starterkit_firmware
- rfc_4072s_firmware
- axc_f_3152_firmware
- axc_f_3152
- plcnext_technology_starterkit
- axc_f_1152_firmware
- axc_f_1152
CWE
CWE-20
Improper Input Validation