CVE-2025-41693
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/12/2025
Last modified:
19/12/2025
Description
A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:phoenixcontact:fl_switch_2708_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2708_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2708_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2708:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2608_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2608_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2608_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2608:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2516_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2516_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2516_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2516:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2514-2sfp_pn_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) | |
| cpe:2.3:h:phoenixcontact:fl_switch_2514-2sfp_pn:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:phoenixcontact:fl_switch_2514-2sfp_firmware:*:*:*:*:*:*:*:* | 3.50 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



