CVE-2025-41692
Severity CVSS v4.0:
Pending analysis
Type:
CWE-916
Use of Password Hash With Insufficient Computational Effort
Publication date:
09/12/2025
Last modified:
19/12/2025
Description
A high privileged remote attacker with admin privileges for the webUI can brute-force the "root" and "user" passwords of the underlying OS due to a weak password generation algorithm.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:phoenixcontact:fl_switch_2708_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2708_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2708_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2708:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2608_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2608_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2608_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2608:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2516_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2516_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2208c_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2208c:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2208_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2208_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2208_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



