CVE-2017-16743
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
12/01/2018
Last modified:
03/10/2019
Description
An Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
| cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:* | 1.0 (including) | 1.32 (including) |
To consult the complete list of CPE names with products and versions, see this page



