Lucene search

K
cve[email protected]CVE-2018-10731
HistoryMay 17, 2018 - 7:29 p.m.

CVE-2018-10731

2018-05-1719:29:00
CWE-119
web.nvd.nist.gov
26
phoenix contact
fl switch
firmware
buffer overflow
cve-2018-10731

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.6%

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728).

Affected configurations

NVD
Node
phoenixcontactfl_switch_3005_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3005Match-
Node
phoenixcontactfl_switch_3005t_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3005tMatch-
Node
phoenixcontactfl_switch_3004t-fx_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3004t-fxMatch-
Node
phoenixcontactfl_switch_3004t-fx_st_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3004t-fx_stMatch-
Node
phoenixcontactfl_switch_3008_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3008Match-
Node
phoenixcontactfl_switch_3008t_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3008tMatch-
Node
phoenixcontactfl_switch_3006t-2fx_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3006t-2fxMatch-
Node
phoenixcontactfl_switch_3006t-2fx_st_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3006t-2fx_stMatch-
Node
phoenixcontactfl_switch_3012e-2sfx_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3012e-2sfxMatch-
Node
phoenixcontactfl_switch_3016e_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3016eMatch-
Node
phoenixcontactfl_switch_3016_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3016Match-
Node
phoenixcontactfl_switch_3016t_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3016tMatch-
Node
phoenixcontactfl_switch_3006t-2fx_sm_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3006t-2fx_smMatch-
Node
phoenixcontactfl_switch_4008t-2sfp_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4008t-2sfpMatch-
Node
phoenixcontactfl_switch_4008t-2gt-4fx_sm_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4008t-2gt-4fx_smMatch-
Node
phoenixcontactfl_switch_4008t-2gt-3fx_sm_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4008t-2gt-3fx_smMatch-
Node
phoenixcontactfl_switch_4808e-16fx_lc-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx_lc-4gcMatch-
Node
phoenixcontactfl_switch_4808e-16fx_sm-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx_sm-4gcMatch-
Node
phoenixcontactfl_switch_4808e-16fx_sm_st-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx_sm_st-4gcMatch-
Node
phoenixcontactfl_switch_4808e-16fx_st-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx_st-4gcMatch-
Node
phoenixcontactfl_switch_4808e-16fx-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx-4gcMatch-
Node
phoenixcontactfl_switch_4808e-16fx_sm_lc-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4808e-16fx_sm_lc-4gcMatch-
Node
phoenixcontactfl_switch_4012t_2gt_2fx_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4012t_2gt_2fxMatch-
Node
phoenixcontactfl_switch_4012t-2gt-2fx_st_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4012t-2gt-2fx_stMatch-
Node
phoenixcontactfl_switch_4824e-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4824e-4gcMatch-
Node
phoenixcontactfl_switch_4800e-24fx-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4800e-24fx-4gcMatch-
Node
phoenixcontactfl_switch_4800e-24fx_sm-4gc_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4800e-24fx_sm-4gcMatch-
Node
phoenixcontactfl_switch_3012e-2fx_sm_firmwareRange1.01.33
AND
phoenixcontactfl_switch_3012e-2fx_smMatch-
Node
phoenixcontactfl_switch_4000t-8poe-2sfp-r_firmwareRange1.01.33
AND
phoenixcontactfl_switch_4000t-8poe-2sfp-rMatch-

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

8 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

71.6%

Related for CVE-2018-10731