Lucene search

K
cve[email protected]CVE-2023-3526
HistoryAug 08, 2023 - 7:15 a.m.

CVE-2023-3526

2023-08-0807:15:10
CWE-79
web.nvd.nist.gov
17
cve-2023-3526
phoenix contact
tc router
tc cloud client
xss
remote code execution

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user’s browser.

Affected configurations

NVD
Node
phoenixcontactcloud_client_1101t-txMatch-
AND
phoenixcontactcloud_client_1101t-tx_firmwareRange<2.06.10
Node
phoenixcontacttc_cloud_client_1002-4g_attMatch-
AND
phoenixcontacttc_cloud_client_1002-4g_att_firmwareRange<2.07.2
Node
phoenixcontacttc_cloud_client_1002-4g_firmwareRange<2.07.2
AND
phoenixcontacttc_cloud_client_1002-4gMatch-
Node
phoenixcontacttc_cloud_client_1002-4g_vzw_firmwareRange<2.07.2
AND
phoenixcontacttc_cloud_client_1002-4g_vzwMatch-
Node
phoenixcontacttc_router_3002t-4g_att_firmwareRange<2.07.2
AND
phoenixcontacttc_router_3002t-4g_attMatch-
Node
phoenixcontacttc_router_3002t-4g_firmwareRange<2.07.2
AND
phoenixcontacttc_router_3002t-4gMatch-
Node
phoenixcontacttc_router_3002t-4g_vzw_firmwareRange<2.07.2
AND
phoenixcontacttc_router_3002t-4g_vzwMatch-

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CLOUD CLIENT 1101T-TX/TX",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.06.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G ATT",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G VZW",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G ATT",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G VZW",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

9.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

9.1 High

AI Score

Confidence

High

0.003 Low

EPSS

Percentile

66.0%

Related for CVE-2023-3526