Lucene search

K
cvelistCERTVDECVELIST:CVE-2023-3569
HistoryAug 08, 2023 - 6:56 a.m.

CVE-2023-3569 PHOENIX CONTACT: Denial-of-Service due to malicious XML files in TC ROUTER, TC CLOUD CLIENT and CLOUD CLIENT

2023-08-0806:56:40
CWE-776
CERTVDE
www.cve.org
phoenix contact
tc router
tc cloud client
denial-of-service
xml files
vulnerability

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "CLOUD CLIENT 1101T-TX/TX",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.06.10",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G ATT",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC CLOUD CLIENT 1002-4G VZW",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G ATT",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "product": "TC ROUTER 3002T-4G VZW",
    "vendor": "PHOENIX CONTACT",
    "versions": [
      {
        "lessThan": "2.07.2",
        "status": "affected",
        "version": "0",
        "versionType": "semver"
      }
    ]
  }
]

4.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

5.3 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

39.3%

Related for CVELIST:CVE-2023-3569