Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-10728 (GCVE-0-2018-10728)
Vulnerability from cvelistv5 – Published: 2018-05-17 19:00 – Updated: 2024-08-05 07:46- n/a
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T07:46:46.641Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"name": "104231",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/104231"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-05-16T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-05-23T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"name": "104231",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/104231"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10728",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"name": "104231",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104231"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2018-006",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-10728",
"datePublished": "2018-05-17T19:00:00.000Z",
"dateReserved": "2018-05-04T00:00:00.000Z",
"dateUpdated": "2024-08-05T07:46:46.641Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*\", \"versionStartExcluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"1D38F9C4-0E71-44CE-ABC6-0143D719895A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CDD6E20C-23E3-4D04-879B-2AC6EF428947\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"73735690-ADDB-499A-AB27-D4DCCE21B0B4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"378D94CF-D885-42D4-8A0E-21CD748F6807\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"0919C5CB-A4F1-426A-BA73-A85CC58A69B0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA9C98D8-21D3-45C1-B060-A9A9E2F3C097\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"FB41B06B-B830-4815-A639-40E9B9C32F0D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7741E125-4A42-49D9-B042-F9CE55635AAC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"DF52AED6-8BF1-4792-8E9D-D226815BD73B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5B6CE354-013E-4F95-BC30-1C9B319EBED2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"B36A962A-FAB4-40C6-84C4-5E04E79D8F53\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9AABEF33-10A0-4799-B838-56EDD19DA0C0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"B33ADABB-39FF-4613-BE1C-DD7A7B07A2BF\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"183345F0-1A43-4721-99C1-6F1A7DF951C5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"711B6552-4F69-41DE-92C0-5EA27CC48709\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"745B393D-B1D4-49B3-B869-54B103DDC09E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"A2A4B5F5-A857-4031-9828-EB17A3C42391\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"18C3DBAE-D5F8-46E8-85CC-FE6F2E50AA21\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAE50CC4-384B-499F-BC7D-E66AB2B8D42F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"9C6A57D5-18F2-4987-9F3C-BBF3F8B44A2E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE5BBAFE-2229-4472-BED8-30A5A2547746\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"BDB2BD69-55E6-4D4F-8268-62319DAE35D8\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"96C7468D-04BA-43B9-9587-A0C7161CBADB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"94001A55-C569-4FD3-BB74-9EC7D85C1473\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"EDB54F98-884C-4786-836C-372E6DCE0620\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"2261AFB3-48FA-426C-A00B-15196C314755\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB83F75C-61AD-4161-B7FC-815BB79DD84C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"08B535E9-1DF4-4695-8415-F4AFCF254DEB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"59A8884E-A04E-4A52-9CE6-8EE210F6CA8A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"37FD7CD9-F2B2-4EA3-9874-5497D4F25179\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D2ACFB7-4685-48F2-8741-AD0ECFC8804E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"EDD1AA63-C7E1-46DB-9326-F4B907ECA31B\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"908636A9-A6F9-488E-A279-85C5410F4E69\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24767260-220D-40D2-82D4-944DD1557C68\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"FF60C4B1-3AFC-4748-8AF5-67258B0A6CFE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D1D7163-5489-47A3-B6DF-13C2C137CD39\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"0F1927B3-4E4C-4BDA-BDAB-092A3D3B69F0\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA4CF1D6-AEB2-4A75-959A-81F70FE7A634\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"B1C6E740-7D1A-42C4-B08F-FA83E8103555\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A11C522-B022-4F38-9DE9-189BAB367CA6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"9E4FB6A6-8C3E-41F1-BA2E-56C4E1752775\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"ACD4A4CA-5B54-4607-BE99-584DF832869D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67F3A41E-72FA-4876-B29C-810A83237E74\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"1B8AC34C-49CE-4F5D-86C3-DBB1B4202019\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"D8F39794-D0AD-47D7-B451-74D6B92CEB8F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5516A419-3B65-4866-91AD-7824C7D93A1E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"2ACA5D46-F2F3-490D-9FC1-2E0C604C3F6F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E9D8EBCA-D4C9-4698-B0A6-78796228ABD7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"1EFC20D4-03D0-4E29-A5DE-F4393A805FD9\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E13750CC-A1ED-4AC5-BE05-C70B0A8E697D\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.0\", \"versionEndIncluding\": \"1.33\", \"matchCriteriaId\": \"4356EA0A-132F-41BD-AE8A-6A409EC05416\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5C8DB2C-0647-42FC-A401-264A6A00621E\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).\"}, {\"lang\": \"es\", \"value\": \"Todos los productos Phoenix Contact managed FL SWITCH 3xxx, 4xxx y 48xx que ejecutan la versi\\u00f3n del firmware 1.0 a 1.33 son propensos a desbordamientos de b\\u00fafer (una vulnerabilidad distinta de CVE-2018-10731).\"}]",
"id": "CVE-2018-10728",
"lastModified": "2024-11-21T03:41:56.097",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2018-05-17T19:29:00.307",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/104231\", \"source\": \"cve@mitre.org\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://cert.vde.com/de-de/advisories/vde-2018-006\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}, {\"url\": \"http://www.securityfocus.com/bid/104231\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://cert.vde.com/de-de/advisories/vde-2018-006\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Third Party Advisory\", \"US Government Resource\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2018-10728\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-05-17T19:29:00.307\",\"lastModified\":\"2024-11-21T03:41:56.097\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).\"},{\"lang\":\"es\",\"value\":\"Todos los productos Phoenix Contact managed FL SWITCH 3xxx, 4xxx y 48xx que ejecutan la versi\u00f3n del firmware 1.0 a 1.33 son propensos a desbordamientos de b\u00fafer (una vulnerabilidad distinta de CVE-2018-10731).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*\",\"versionStartExcluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1D38F9C4-0E71-44CE-ABC6-0143D719895A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDD6E20C-23E3-4D04-879B-2AC6EF428947\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"73735690-ADDB-499A-AB27-D4DCCE21B0B4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"378D94CF-D885-42D4-8A0E-21CD748F6807\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"0919C5CB-A4F1-426A-BA73-A85CC58A69B0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA9C98D8-21D3-45C1-B060-A9A9E2F3C097\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"FB41B06B-B830-4815-A639-40E9B9C32F0D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7741E125-4A42-49D9-B042-F9CE55635AAC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"DF52AED6-8BF1-4792-8E9D-D226815BD73B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B6CE354-013E-4F95-BC30-1C9B319EBED2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B36A962A-FAB4-40C6-84C4-5E04E79D8F53\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AABEF33-10A0-4799-B838-56EDD19DA0C0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B33ADABB-39FF-4613-BE1C-DD7A7B07A2BF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"183345F0-1A43-4721-99C1-6F1A7DF951C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"711B6552-4F69-41DE-92C0-5EA27CC48709\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"745B393D-B1D4-49B3-B869-54B103DDC09E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"A2A4B5F5-A857-4031-9828-EB17A3C42391\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"18C3DBAE-D5F8-46E8-85CC-FE6F2E50AA21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAE50CC4-384B-499F-BC7D-E66AB2B8D42F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"9C6A57D5-18F2-4987-9F3C-BBF3F8B44A2E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE5BBAFE-2229-4472-BED8-30A5A2547746\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"BDB2BD69-55E6-4D4F-8268-62319DAE35D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"96C7468D-04BA-43B9-9587-A0C7161CBADB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94001A55-C569-4FD3-BB74-9EC7D85C1473\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"EDB54F98-884C-4786-836C-372E6DCE0620\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"2261AFB3-48FA-426C-A00B-15196C314755\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB83F75C-61AD-4161-B7FC-815BB79DD84C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"08B535E9-1DF4-4695-8415-F4AFCF254DEB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59A8884E-A04E-4A52-9CE6-8EE210F6CA8A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"37FD7CD9-F2B2-4EA3-9874-5497D4F25179\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D2ACFB7-4685-48F2-8741-AD0ECFC8804E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"EDD1AA63-C7E1-46DB-9326-F4B907ECA31B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"908636A9-A6F9-488E-A279-85C5410F4E69\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24767260-220D-40D2-82D4-944DD1557C68\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"FF60C4B1-3AFC-4748-8AF5-67258B0A6CFE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D1D7163-5489-47A3-B6DF-13C2C137CD39\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"0F1927B3-4E4C-4BDA-BDAB-092A3D3B69F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4CF1D6-AEB2-4A75-959A-81F70FE7A634\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"B1C6E740-7D1A-42C4-B08F-FA83E8103555\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A11C522-B022-4F38-9DE9-189BAB367CA6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"9E4FB6A6-8C3E-41F1-BA2E-56C4E1752775\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"ACD4A4CA-5B54-4607-BE99-584DF832869D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67F3A41E-72FA-4876-B29C-810A83237E74\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1B8AC34C-49CE-4F5D-86C3-DBB1B4202019\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"D8F39794-D0AD-47D7-B451-74D6B92CEB8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5516A419-3B65-4866-91AD-7824C7D93A1E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"2ACA5D46-F2F3-490D-9FC1-2E0C604C3F6F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9D8EBCA-D4C9-4698-B0A6-78796228ABD7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"1EFC20D4-03D0-4E29-A5DE-F4393A805FD9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13750CC-A1ED-4AC5-BE05-C70B0A8E697D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0\",\"versionEndIncluding\":\"1.33\",\"matchCriteriaId\":\"4356EA0A-132F-41BD-AE8A-6A409EC05416\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5C8DB2C-0647-42FC-A401-264A6A00621E\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/104231\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-006\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.securityfocus.com/bid/104231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://cert.vde.com/de-de/advisories/vde-2018-006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]}]}}"
}
}
VAR-201805-0721
Vulnerability from variot - Updated: 2023-12-18 13:02All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731). plural Phoenix Contact FL SWITCH The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PhoenixContact is a German provider of industrial automation, connectivity and interface solutions for critical infrastructure applications such as communications, critical manufacturing and information technology. PhoenixContactmanagedFLSWITCH has a buffer overflow vulnerability that allows an attacker to insert a specially crafted cookie into a GET request to cause a buffer overflow, thereby triggering a denial of service attack and executing arbitrary code. An OS command-execution vulnerability 2. An information-disclosure vulnerability 3. Multiple stack-based buffer-overflow vulnerabilities Attackers can exploit these issues to execute arbitrary code, execute arbitrary OS commands, obtain sensitive information, and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201805-0721",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "fl switch 3012e-2fx sm",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3005t",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3012e-2fx sm",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3008t",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3016e",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx sm lc-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3008t",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4824e-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4008t-2sfp",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3005t",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4008t-2gt-3fx sm",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3012e-2sfx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4008t-2gt-3fx sm",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3016e",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4012t-2gt-2fx st",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3012e-2sfx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4824e-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx lc-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4008t-2sfp",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4808e-16fx sm-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4012t-2gt-2fx st",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4808e-16fx lc-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4808e-16fx sm st-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx sm-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3005",
"scope": "gt",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3004t-fx st",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3006t-2fx sm",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4808e-16fx sm st-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3006t-2fx sm",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3004t-fx st",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4800e-24fx sm-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4008t-2gt-4fx sm",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3006t-2fx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4008t-2gt-4fx sm",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3016t",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3006t-2fx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4800e-24fx sm-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3004t-fx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4800e-24fx-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4000t-8poe-2sfp-r",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3016t",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4000t-8poe-2sfp-r",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3004t-fx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4800e-24fx-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3008",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3016",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx st-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4808e-16fx sm lc-4gc",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 4012t 2gt 2fx",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3008",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3016",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3006t-2fx st",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 3005",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4808e-16fx st-4gc",
"scope": "lte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.33"
},
{
"model": "fl switch 4012t 2gt 2fx",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3006t-2fx st",
"scope": "gte",
"trust": 1.0,
"vendor": "phoenixcontact",
"version": "1.0"
},
{
"model": "fl switch 3004t-fx st",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3004t-fx",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3005",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3005t",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3006t-2fx sm",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3006t-2fx st",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3006t-2fx",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3008",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3008t",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3012e-2fx sm",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3012e-2sfx",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3016",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3016e",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 3016t",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4000t-8poe-2sfp-r",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4008t-2gt-3fx sm",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4008t-2gt-4fx sm",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4008t-2sfp",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4012t 2gt 2fx",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4012t-2gt-2fx st",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4800e-24fx sm-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4800e-24fx-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx lc-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx sm lc-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx sm st-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx sm-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx st-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4808e-16fx-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "fl switch 4824e-4gc",
"scope": "eq",
"trust": 0.8,
"vendor": "phoenix contact",
"version": "1.0 to 1.33"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.6,
"vendor": "phoenix",
"version": "3xxx\u003e=1.0,\u003c=1.32"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.6,
"vendor": "phoenix",
"version": "4xxx\u003e=1.0,\u003c=1.32"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.6,
"vendor": "phoenix",
"version": "48xxx\u003e=1.0,\u003c=1.32"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "4xxx1.32"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "4xxx1.0"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "48xx1.32"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "48xx1.0"
},
{
"model": "contact fl switch 4824e-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4824e-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx st-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx st-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx sm-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx sm-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx sm st-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx sm st-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx sm lc-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx sm lc-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4808e-16fx lc-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4808e-16fx lc-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4800e-24fx-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4800e-24fx-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4800e-24fx sm-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4800e-24fx sm-4gc",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4012t-2gt-2fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4012t-2gt-2fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4012t 2gt 2fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4012t 2gt 2fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4008t-2sfp",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4008t-2sfp",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4008t-2gt-4fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4008t-2gt-4fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4008t-2gt-3fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4008t-2gt-3fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4000t-8poe-2sfp-r",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 4000t-8poe-2sfp-r",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "3xxx1.32"
},
{
"model": "contact fl switch series",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "3xxx1.0"
},
{
"model": "contact fl switch 3016t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3016t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3016e",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3016e",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30161.32"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30161.0"
},
{
"model": "contact fl switch 3012e-2sfx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3012e-2sfx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3012e-2fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3012e-2fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3008t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3008t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30081.32"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30081.0"
},
{
"model": "contact fl switch 3006t-2fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3006t-2fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3006t-2fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3006t-2fx sm",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3006t-2fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3006t-2fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3005t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3005t",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30051.32"
},
{
"model": "contact fl switch",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "30051.0"
},
{
"model": "contact fl switch 3004t-fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3004t-fx st",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 3004t-fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.32"
},
{
"model": "contact fl switch 3004t-fx",
"scope": "eq",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.0"
},
{
"model": "contact fl switch 4824e-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4808e-16fx-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4808e-16fx st-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4808e-16fx sm-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4808e-16fx sm st-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4808e-16fx sm lc-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4800e-24fx-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4800e-24fx sm-4gc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4012t-2gt-2fx st",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4012t 2gt 2fx",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4008t-2sfp",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4008t-2gt-4fx sm",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4008t-2gt-3fx sm",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 4000t-8poe-2sfp-r",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3016t",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3016e",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "30161.34"
},
{
"model": "contact fl switch 3012e-2sfx",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3012e-2fx sm",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3008t",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "30081.34"
},
{
"model": "contact fl switch 3006t-2fx sm",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3006t-2fx",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3005t",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "30051.34"
},
{
"model": "contact fl switch 3004t-fx st",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch 3004t-fx",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": "contact fl switch -4804g8ce-16fx lc",
"scope": "ne",
"trust": 0.3,
"vendor": "phoenix",
"version": "1.34"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3005",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3016e",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3016",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3016t",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3006t 2fx sm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4008t 2sfp",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4008t 2gt 4fx sm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4008t 2gt 3fx sm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx lc 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx sm 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx sm st 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3005t",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx st 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4808e 16fx sm lc 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4012t 2gt 2fx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4012t 2gt 2fx st",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4824e 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4800e 24fx 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4800e 24fx sm 4gc",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3012e 2fx sm",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 4000t 8poe 2sfp r",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3004t fx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3004t fx st",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3008",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3008t",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3006t 2fx",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3006t 2fx st",
"version": "*"
},
{
"model": null,
"scope": "eq",
"trust": 0.2,
"vendor": "fl switch 3012e 2sfx",
"version": "*"
}
],
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "BID",
"id": "104231"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartExcluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10728"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "ERT@VDE working with Vyacheslav Moskvin, Semen Sokolov, Evgeniy Druzhinin, Georgy Zaytsev and Ilya Karpov of Positive Technologies and PHOENIX CONTACT.",
"sources": [
{
"db": "BID",
"id": "104231"
}
],
"trust": 0.3
},
"cve": "CVE-2018-10728",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Medium",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 6.8,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "CVE-2018-10728",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "CNVD-2018-10149",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "IVD",
"availabilityImpact": "COMPLETE",
"baseScore": 7.6,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 4.9,
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.2,
"vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.9 [IVD]"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
{
"attackComplexity": "High",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 8.1,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2018-10728",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2018-10728",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2018-10149",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201805-520",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1",
"trust": 0.2,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731). plural Phoenix Contact FL SWITCH The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. PhoenixContact is a German provider of industrial automation, connectivity and interface solutions for critical infrastructure applications such as communications, critical manufacturing and information technology. PhoenixContactmanagedFLSWITCH has a buffer overflow vulnerability that allows an attacker to insert a specially crafted cookie into a GET request to cause a buffer overflow, thereby triggering a denial of service attack and executing arbitrary code. An OS command-execution vulnerability\n2. An information-disclosure vulnerability\n3. Multiple stack-based buffer-overflow vulnerabilities\nAttackers can exploit these issues to execute arbitrary code, execute arbitrary OS commands, obtain sensitive information, and perform unauthorized actions. Failed exploit attempts will likely cause a denial-of-service condition",
"sources": [
{
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "BID",
"id": "104231"
},
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
}
],
"trust": 2.61
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2018-10728",
"trust": 3.5
},
{
"db": "CERT@VDE",
"id": "VDE-2018-006",
"trust": 3.0
},
{
"db": "ICS CERT",
"id": "ICSA-18-137-02",
"trust": 2.7
},
{
"db": "BID",
"id": "104231",
"trust": 1.3
},
{
"db": "CNVD",
"id": "CNVD-2018-10149",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165",
"trust": 0.8
},
{
"db": "IVD",
"id": "E2EFD4B0-39AB-11E9-8585-000C29342CB1",
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "BID",
"id": "104231"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"id": "VAR-201805-0721",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
}
],
"trust": 1.60208335
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"ICS",
"Network device"
],
"sub_category": null,
"trust": 0.6
},
{
"category": [
"ICS"
],
"sub_category": null,
"trust": 0.2
}
],
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
}
]
},
"last_update_date": "2023-12-18T13:02:39.812000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Top Page",
"trust": 0.8,
"url": "https://www.phoenixcontact.com/online/portal/pc"
},
{
"title": "Patch for PhoenixContactmanagedFLSWITCH Buffer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/130067"
},
{
"title": "PHOENIX CONTACT FL SWITCH 3xxx , 4xxx and 48xxx Series Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=83452"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 3.0,
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
},
{
"trust": 2.7,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-18-137-02"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/104231"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-10728"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2018-10728"
},
{
"trust": 0.3,
"url": "https://www.phoenixcontact.com/online/portal/pc"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "BID",
"id": "104231"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"db": "BID",
"id": "104231"
},
{
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-23T00:00:00",
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"date": "2018-05-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"date": "2018-05-17T00:00:00",
"db": "BID",
"id": "104231"
},
{
"date": "2018-07-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"date": "2018-05-17T19:29:00.307000",
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"date": "2018-05-17T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2018-05-23T00:00:00",
"db": "CNVD",
"id": "CNVD-2018-10149"
},
{
"date": "2018-05-17T00:00:00",
"db": "BID",
"id": "104231"
},
{
"date": "2018-07-09T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2018-005165"
},
{
"date": "2018-06-20T15:47:39.513000",
"db": "NVD",
"id": "CVE-2018-10728"
},
{
"date": "2018-05-23T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Phoenix Contact managed FL SWITCH Buffer Overflow Vulnerability",
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNVD",
"id": "CNVD-2018-10149"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow",
"sources": [
{
"db": "IVD",
"id": "e2efd4b0-39ab-11e9-8585-000c29342cb1"
},
{
"db": "CNNVD",
"id": "CNNVD-201805-520"
}
],
"trust": 0.8
}
}
GSD-2018-10728
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-10728",
"description": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).",
"id": "GSD-2018-10728"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-10728"
],
"details": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).",
"id": "GSD-2018-10728",
"modified": "2023-12-13T01:22:40.670818Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10728",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02",
"refsource": "MISC",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"name": "104231",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/104231"
},
{
"name": "https://cert.vde.com/de-de/advisories/vde-2018-006",
"refsource": "CONFIRM",
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartExcluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-10728"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://cert.vde.com/de-de/advisories/vde-2018-006",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
},
{
"name": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02",
"refsource": "MISC",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"name": "104231",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104231"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
},
"lastModifiedDate": "2018-06-20T15:47Z",
"publishedDate": "2018-05-17T19:29Z"
}
}
}
CNVD-2018-10149
Vulnerability from cnvd - Published: 2018-05-23目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页: https://www.phoenixcontact.com/
| Name | ['PHOENIX CONTACT FL SWITCH 3xxx >=1.0,<=1.32', 'PHOENIX CONTACT FL SWITCH 4xxx >=1.0,<=1.32', 'PHOENIX CONTACT FL SWITCH 48xxx Series >=1.0,<=1.32'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-10728"
}
},
"description": "Phoenix Contact\u662f\u5fb7\u56fd\u5de5\u4e1a\u81ea\u52a8\u5316\u3001\u8fde\u63a5\u6027\u548c\u63a5\u53e3\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\u5546\uff0c\u5176\u4ea7\u54c1\u4e3b\u8981\u5e94\u7528\u5728\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u9886\u57df\uff0c\u4f8b\u5982\u901a\u4fe1\u3001\u5173\u952e\u5236\u9020\u548c\u4fe1\u606f\u6280\u672f\u7b49\u884c\u4e1a\u3002\r\n\r\nPhoenix Contact managed FL SWITCH\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7cbe\u5fc3\u8bbe\u8ba1\u7684cookie\u63d2\u5165\u5230GET\u8bf7\u6c42\u4e2d\uff0c\u4ee5\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u4ece\u800c\u542f\u52a8\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u5e76\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"discovererName": "CERT@VDE working with Vyacheslav Moskvin, Semen Sokolov, Evgeniy Druzhinin, Georgy Zaytsev and Ilya Karpov of Positive Technologies and PHOENIX CONTACT",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8be6\u60c5\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\uff1a\r\nhttps://www.phoenixcontact.com/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-10149",
"openTime": "2018-05-23",
"patchDescription": "Phoenix Contact\u662f\u5fb7\u56fd\u5de5\u4e1a\u81ea\u52a8\u5316\u3001\u8fde\u63a5\u6027\u548c\u63a5\u53e3\u89e3\u51b3\u65b9\u6848\u63d0\u4f9b\u5546\uff0c\u5176\u4ea7\u54c1\u4e3b\u8981\u5e94\u7528\u5728\u5173\u952e\u57fa\u7840\u8bbe\u65bd\u9886\u57df\uff0c\u4f8b\u5982\u901a\u4fe1\u3001\u5173\u952e\u5236\u9020\u548c\u4fe1\u606f\u6280\u672f\u7b49\u884c\u4e1a\u3002\r\n\r\nPhoenix Contact managed FL SWITCH\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7cbe\u5fc3\u8bbe\u8ba1\u7684cookie\u63d2\u5165\u5230GET\u8bf7\u6c42\u4e2d\uff0c\u4ee5\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\uff0c\u4ece\u800c\u542f\u52a8\u62d2\u7edd\u670d\u52a1\u653b\u51fb\u5e76\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Phoenix Contact managed FL SWITCH\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"PHOENIX CONTACT FL SWITCH 3xxx \u003e=1.0\uff0c\u003c=1.32",
"PHOENIX CONTACT FL SWITCH 4xxx \u003e=1.0\uff0c\u003c=1.32",
"PHOENIX CONTACT FL SWITCH 48xxx Series \u003e=1.0\uff0c\u003c=1.32"
]
},
"referenceLink": "https://cert.vde.com/de-de/advisories/vde-2018-006\r\nhttps://ics-cert.us-cert.gov/advisories/ICSA-18-137-02",
"serverity": "\u9ad8",
"submitTime": "2018-05-21",
"title": "Phoenix Contact managed FL SWITCH\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
GHSA-RWM3-GQ5C-P5RR
Vulnerability from github – Published: 2022-05-14 03:17 – Updated: 2022-05-14 03:17All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).
{
"affected": [],
"aliases": [
"CVE-2018-10728"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-05-17T19:29:00Z",
"severity": "HIGH"
},
"details": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).",
"id": "GHSA-rwm3-gq5c-p5rr",
"modified": "2022-05-14T03:17:26Z",
"published": "2022-05-14T03:17:26Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-10728"
},
{
"type": "WEB",
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
},
{
"type": "WEB",
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/104231"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2018-10728
Vulnerability from fkie_nvd - Published: 2018-05-17 19:29 - Updated: 2024-11-21 03:41| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://cert.vde.com/de-de/advisories/vde-2018-006 | Patch, Third Party Advisory | |
| cve@mitre.org | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104231 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://cert.vde.com/de-de/advisories/vde-2018-006 | Patch, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02 | Patch, Third Party Advisory, US Government Resource |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1D38F9C4-0E71-44CE-ABC6-0143D719895A",
"versionEndIncluding": "1.33",
"versionStartExcluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD6E20C-23E3-4D04-879B-2AC6EF428947",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73735690-ADDB-499A-AB27-D4DCCE21B0B4",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "378D94CF-D885-42D4-8A0E-21CD748F6807",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0919C5CB-A4F1-426A-BA73-A85CC58A69B0",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9C98D8-21D3-45C1-B060-A9A9E2F3C097",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FB41B06B-B830-4815-A639-40E9B9C32F0D",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7741E125-4A42-49D9-B042-F9CE55635AAC",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DF52AED6-8BF1-4792-8E9D-D226815BD73B",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5B6CE354-013E-4F95-BC30-1C9B319EBED2",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36A962A-FAB4-40C6-84C4-5E04E79D8F53",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9AABEF33-10A0-4799-B838-56EDD19DA0C0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B33ADABB-39FF-4613-BE1C-DD7A7B07A2BF",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "183345F0-1A43-4721-99C1-6F1A7DF951C5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "711B6552-4F69-41DE-92C0-5EA27CC48709",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*",
"matchCriteriaId": "745B393D-B1D4-49B3-B869-54B103DDC09E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2A4B5F5-A857-4031-9828-EB17A3C42391",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4E73E8DE-CCC4-43EC-8DD5-B8F75EA06A79",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "18C3DBAE-D5F8-46E8-85CC-FE6F2E50AA21",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE50CC4-384B-499F-BC7D-E66AB2B8D42F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C6A57D5-18F2-4987-9F3C-BBF3F8B44A2E",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5BBAFE-2229-4472-BED8-30A5A2547746",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDB2BD69-55E6-4D4F-8268-62319DAE35D8",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20E4B7B8-0BCF-4A6D-A1D6-D76D7B67277D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "96C7468D-04BA-43B9-9587-A0C7161CBADB",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "94001A55-C569-4FD3-BB74-9EC7D85C1473",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB54F98-884C-4786-836C-372E6DCE0620",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8BDDB1D7-3E0C-4C06-B19F-A2FE8F6CC541",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2261AFB3-48FA-426C-A00B-15196C314755",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB83F75C-61AD-4161-B7FC-815BB79DD84C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08B535E9-1DF4-4695-8415-F4AFCF254DEB",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "59A8884E-A04E-4A52-9CE6-8EE210F6CA8A",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37FD7CD9-F2B2-4EA3-9874-5497D4F25179",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D2ACFB7-4685-48F2-8741-AD0ECFC8804E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD1AA63-C7E1-46DB-9326-F4B907ECA31B",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "640ECB9C-3D8C-4BCD-A0AF-AA79DE508FD0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "908636A9-A6F9-488E-A279-85C5410F4E69",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "24767260-220D-40D2-82D4-944DD1557C68",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF60C4B1-3AFC-4748-8AF5-67258B0A6CFE",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2D1D7163-5489-47A3-B6DF-13C2C137CD39",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F1927B3-4E4C-4BDA-BDAB-092A3D3B69F0",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DA4CF1D6-AEB2-4A75-959A-81F70FE7A634",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1C6E740-7D1A-42C4-B08F-FA83E8103555",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A11C522-B022-4F38-9DE9-189BAB367CA6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9E4FB6A6-8C3E-41F1-BA2E-56C4E1752775",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF8A0E7B-0B6D-496C-81A4-077C4D1BA2BA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ACD4A4CA-5B54-4607-BE99-584DF832869D",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67F3A41E-72FA-4876-B29C-810A83237E74",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1B8AC34C-49CE-4F5D-86C3-DBB1B4202019",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AF48CE-231F-42F9-BF50-B3E8FB49D0F0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D8F39794-D0AD-47D7-B451-74D6B92CEB8F",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5516A419-3B65-4866-91AD-7824C7D93A1E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2ACA5D46-F2F3-490D-9FC1-2E0C604C3F6F",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E9D8EBCA-D4C9-4698-B0A6-78796228ABD7",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EFC20D4-03D0-4E29-A5DE-F4393A805FD9",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E13750CC-A1ED-4AC5-BE05-C70B0A8E697D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4356EA0A-132F-41BD-AE8A-6A409EC05416",
"versionEndIncluding": "1.33",
"versionStartIncluding": "1.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F5C8DB2C-0647-42FC-A401-264A6A00621E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731)."
},
{
"lang": "es",
"value": "Todos los productos Phoenix Contact managed FL SWITCH 3xxx, 4xxx y 48xx que ejecutan la versi\u00f3n del firmware 1.0 a 1.33 son propensos a desbordamientos de b\u00fafer (una vulnerabilidad distinta de CVE-2018-10731)."
}
],
"id": "CVE-2018-10728",
"lastModified": "2024-11-21T03:41:56.097",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-05-17T19:29:00.307",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104231"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/104231"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
],
"url": "https://cert.vde.com/de-de/advisories/vde-2018-006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory",
"US Government Resource"
],
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-18-137-02"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
ICSA-18-137-02
Vulnerability from csaf_cisa - Published: 2018-05-17 00:00 - Updated: 2018-05-17 00:00{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "reporting the vulnerabilities to NCCIC"
},
{
"names": [
"Vyacheslav Moskvin",
"Semen Sokolov",
"Evgeniy Druzhinin",
"Georgy Zaytsev",
"Ilya Karpov"
],
"organization": "Positive Technologies",
"summary": "reporting the vulnerabilities to NCCIC"
},
{
"organization": "PHOENIX CONTACT",
"summary": "reporting the vulnerabilities to NCCIC"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow for remote code execution and information disclosure.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Communications, Critical Manufacturing, Information Technology",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "Germany",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "NCCIC recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities. Specifically, users should:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC also provides a section for control systems security recommended practices on the ICS-CERT web page. Several recommended practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing any suspected malicious activity should follow their established internal procedures and report their findings to NCCIC for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "NCCIC also recommends that users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS-CERT website in the Technical Information Paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "other",
"text": "No known public exploits specifically target these vulnerabilities.",
"title": "Exploitability"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "Email: CISAservicedesk@cisa.dhs.gov;\n Toll Free: 1-888-282-0870",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-18-137-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2018/icsa-18-137-02.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-18-137-02 Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-18-137-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
}
],
"title": "PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series",
"tracking": {
"current_release_date": "2018-05-17T00:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-18-137-02",
"initial_release_date": "2018-05-17T00:00:00.000000Z",
"revision_history": [
{
"date": "2018-05-17T00:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "ICSA-18-137-02 PHOENIX CONTACT FL SWITCH 3xxx/4xxx/48xx Series"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= 1.0 | \u003c= 1.32",
"product": {
"name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware: Version 1.0 to 1.32 are affected",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "All FL SWITCH 3xxx 4xxx and 48xxx Series products running firmware"
}
],
"category": "vendor",
"name": "PHOENIX CONTACT, Innominate Security Technologies"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-10730",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "An attacker with permission to transfer configuration files to or from the switch or permission to upgrade firmware is able to execute arbitrary OS shell commands.CVE-2018-10730 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10730"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "FL SWITCH 3005",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891030/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3005T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891032/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891033/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891034/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891031/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891035/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891036/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891037/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2SFX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891067/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016E",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891066/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891058/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891059/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891060/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2SFP",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891062/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-4FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891061/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-3FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891160/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891073/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891080/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891086/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891085/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891079/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891074/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T 2GT 2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891063/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T-2GT-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891161/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4824E-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891072/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891102/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891104/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891120/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891119/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4000T-8POE-2SFP-R",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891162/firmware_update"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2018-10729",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "summary",
"text": "Web interface CGI applications may copy the contents of the running configuration file to a commonly accessed file. Manipulation of a web login request can expose the contents of this file through to the web browser. A successful web interface login attempt is not required to read the configuration file contents.CVE-2018-10729 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10729"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "FL SWITCH 3005",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891030/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3005T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891032/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891033/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891034/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891031/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891035/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891036/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891037/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2SFX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891067/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016E",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891066/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891058/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891059/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891060/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2SFP",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891062/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-4FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891061/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-3FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891160/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891073/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891080/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891086/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891085/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891079/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891074/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T 2GT 2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891063/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T-2GT-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891161/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4824E-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891072/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891102/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891104/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891120/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891119/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4000T-8POE-2SFP-R",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891162/firmware_update"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2018-10728",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "An attacker may insert a carefully crafted cookie into a GET request to cause a buffer overflow that can initiate a denial of service attack and execute arbitrary code.CVE-2018-10728 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10728"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "FL SWITCH 3005",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891030/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3005T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891032/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891033/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891034/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891031/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891035/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891036/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891037/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2SFX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891067/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016E",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891066/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891058/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891059/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891060/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2SFP",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891062/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-4FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891061/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-3FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891160/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891073/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891080/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891086/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891085/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891079/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891074/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T 2GT 2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891063/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T-2GT-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891161/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4824E-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891072/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891102/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891104/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891120/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891119/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4000T-8POE-2SFP-R",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891162/firmware_update"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2018-10731",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "A remote attacker may exploit a long cookie related vulnerability to cause a buffer overflow that allows unauthorized access to the switches operating system files and the insertion of executable code into the OS.CVE-2018-10731 has been assigned to this vulnerability. A CVSS v3 base score of 9.0 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"references": [
{
"category": "external",
"summary": "web.nvd.nist.gov",
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-10731"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "FL SWITCH 3005",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891030/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3005T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891032/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891033/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3004T-FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891034/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891031/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3008T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891035/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891036/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891037/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2SFX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891067/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016E",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891066/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891058/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3016T",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891059/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3006T-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891060/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2SFP",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891062/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-4FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891061/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4008T-2GT-3FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891160/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891073/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891080/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891086/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX ST-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891085/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891079/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4808E-16FX SM LC-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891074/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T 2GT 2FX",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891063/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4012T-2GT-2FX ST",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891161/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4824E-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891072/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891102/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891104/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4800E-24FX SM-4GC",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891120/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 3012E-2FX SM",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891119/firmware_update"
},
{
"category": "mitigation",
"details": "FL SWITCH 4000T-8POE-2SFP-R",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://www.phoenixcontact.net/qr/2891162/firmware_update"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
VDE-2018-006
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2018-05-16 10:00 - Updated: 2025-05-14 13:00All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination",
"urls": [
"https://certvde.com"
]
},
{
"names": [
"Evgeniy Druzhinin",
"Georgy Zaytsev ",
"Ilya Karpov"
],
"organization": "Positive Technologies"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "An attacker may insert a carefully crafted cookie into a GET menu_pxc.cgi or GET index.cgi request to cause a buffer overflow that can initiate a Denial of Service attack and execute arbitrary code.",
"title": "Summary"
},
{
"category": "description",
"text": "If vulnerability is exploited, the attacker may disable Web and Telnet services and execute arbitrary code.\n\nUpdate 2018-05-28\n\nDue to the way this vulnerability was discovered, the Attack Complexity has been changed from HIGH to LOW. This results in a new CVSS Vector with a severity of 9.8.",
"title": "Impact"
},
{
"category": "description",
"text": "Customers using Phoenix Contact managed FL SWITCH devices with affected firmware versions are recommended to disable the switch Web Agent.",
"title": "Mitigation"
},
{
"category": "description",
"text": "Customers using Phoenix Contact managed FL SWITCH devices with affected firmware versions are recommended to update the firmware to version 1.34 or higher which fixes this vulnerability. The updated firmware may be downloaded from the managed switch product page on the Phoenix Contact website:\n| Article No. | Model | Updated Firmware |\n|-------------|---------------------------------------|-------------------------------------------------------------------------------------------------------------|\n| 2891030 | FL SWITCH 3005 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3005-2891030?type=firmware_update) |\n| 2891032 | FL SWITCH 3005T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3005t-2891032?type=firmware_update) |\n| 2891033 | FL SWITCH 3004T-FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3004t-fx-2891033?type=firmware_update) |\n| 2891034 | FL SWITCH 3004T-FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3004t-fx-st-2891034?type=firmware_update) |\n| 2891031 | FL SWITCH 3008 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3008-2891031?type=firmware_update) |\n| 2891035 | FL SWITCH 3008T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3008t-2891035?type=firmware_update) |\n| 2891036 | FL SWITCH 3006T-2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-2891036?type=firmware_update) |\n| 2891037 | FL SWITCH 3006T-2FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-st-2891037?type=firmware_update) |\n| 2891067 | FL SWITCH 3012E-2SFX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2sfx-2891067?type=firmware_update) |\n| 2891066 | FL SWITCH 3016E | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016e-2891066?type=firmware_update) |\n| 2891058 | FL SWITCH 3016 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016-2891058?type=firmware_update) |\n| 2891059 | FL SWITCH 3016T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016t-2891059?type=firmware_update) |\n| 2891060 | FL SWITCH 3006T-2FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-sm-2891060?type=firmware_update) |\n| 2891062 | FL SWITCH 4008T-2SFP | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2sfp-2891062?type=firmware_update) |\n| 2891061 | FL SWITCH 4008T-2GT-4FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2gt-4fx-sm-2891061?type=firmware_update) |\n| 2891160 | FL SWITCH 4008T-2GT-3FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2gt-3fx-sm-2891160?type=firmware_update) |\n| 2891073 | FL SWITCH 4808E-16FX LC-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-lc-4gc-2891073?type=firmware_update) |\n| 2891080 | FL SWITCH 4808E-16FX SM-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-4gc-2891080?type=firmware_update) |\n| 2891086 | FL SWITCH 4808E-16FX SM ST-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-st-4gc-2891086?type=firmware_update) |\n| 2891085 | FL SWITCH 4808E-16FX ST-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-st-4gc-2891085?type=firmware_update) |\n| 2891079 | FL SWITCH 4808E-16FX-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-4gc-2891079?type=firmware_update) |\n| 2891074 | FL SWITCH 4808E-16FX SM LC-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-lc-4gc-2891074?type=firmware_update) |\n| 2891063 | FL SWITCH 4012T 2GT 2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4012t-2gt-2fx-2891063?type=firmware_update) |\n| 2891161 | FL SWITCH 4012T-2GT-2FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4012t-2gt-2fx-st-2891161?type=firmware_update) |\n| 2891072 | FL SWITCH 4824E-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4824e-4gc-2891072?type=firmware_update) |\n| 2891102 | FL SWITCH 4800E-24FX-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4800e-24fx-4gc-2891102?type=firmware_update) |\n| 2891104 | FL SWITCH 4800E-24FX SM-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4800e-24fx-sm-4gc-2891104?type=firmware_update) |\n| 2891120 | FL SWITCH 3012E-2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2fx-2891120?type=firmware_update) |\n| 2891119 | FL SWITCH 3012E-2FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2fx-sm-2891119?type=firmware_update) |\n| 2891162 | FL SWITCH 4000T-8POE-2SFP-R | please contact your local customer service |",
"title": "Remediation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "CERT@VDE Security Advisories for Phoenix Contact",
"url": "https://certvde.com/en/advisories/vendor/phoenixcontact/"
},
{
"category": "self",
"summary": "VDE-2018-006: Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow - HTML",
"url": "https://certvde.com/en/advisories/VDE-2018-006"
},
{
"category": "self",
"summary": "VDE-2018-006: Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2018/vde-2018-006.json"
}
],
"title": "Phoenix Contact: FL SWITCH 3xxx/4xxx/48xx series through 1.33 has a Stack-based Buffer Overflow",
"tracking": {
"aliases": [
"VDE-2018-006"
],
"current_release_date": "2025-05-14T13:00:15.000Z",
"generator": {
"date": "2025-03-19T14:54:16.318Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.21"
}
},
"id": "VDE-2018-006",
"initial_release_date": "2018-05-16T10:00:00.000Z",
"revision_history": [
{
"date": "2018-05-16T10:00:00.000Z",
"number": "1",
"summary": "Initial revision."
},
{
"date": "2018-05-28T10:00:00.000Z",
"number": "2",
"summary": "Update"
},
{
"date": "2025-05-14T13:00:15.000Z",
"number": "3",
"summary": "Fix: added distribution"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "FL SWITCH 3004T-FX",
"product": {
"name": "FL SWITCH 3004T-FX",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"2891033"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3004T-FX ST",
"product": {
"name": "FL SWITCH 3004T-FX ST",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2891034"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3005",
"product": {
"name": "FL SWITCH 3005",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"2891030"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3005T",
"product": {
"name": "FL SWITCH 3005T",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"2891032"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3006T-2FX",
"product": {
"name": "FL SWITCH 3006T-2FX",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"2891036"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3006T-2FX SM",
"product": {
"name": "FL SWITCH 3006T-2FX SM",
"product_id": "CSAFPID-11006",
"product_identification_helper": {
"model_numbers": [
"2891060"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3006T-2FX ST",
"product": {
"name": "FL SWITCH 3006T-2FX ST",
"product_id": "CSAFPID-11007",
"product_identification_helper": {
"model_numbers": [
"2891037"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3008",
"product": {
"name": "FL SWITCH 3008",
"product_id": "CSAFPID-11008",
"product_identification_helper": {
"model_numbers": [
"2891031"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3008T",
"product": {
"name": "FL SWITCH 3008T",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"model_numbers": [
"2891035"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3012E-2FX",
"product": {
"name": "FL SWITCH 3012E-2FX",
"product_id": "CSAFPID-11010",
"product_identification_helper": {
"model_numbers": [
"2891120"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3012E-2FX SM",
"product": {
"name": "FL SWITCH 3012E-2FX SM",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"model_numbers": [
"2891119"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3012E-2SFX",
"product": {
"name": "FL SWITCH 3012E-2SFX",
"product_id": "CSAFPID-11012",
"product_identification_helper": {
"model_numbers": [
"2891067"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3016",
"product": {
"name": "FL SWITCH 3016",
"product_id": "CSAFPID-11013",
"product_identification_helper": {
"model_numbers": [
"2891058"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3016E",
"product": {
"name": "FL SWITCH 3016E",
"product_id": "CSAFPID-11014",
"product_identification_helper": {
"model_numbers": [
"2891066"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 3016T",
"product": {
"name": "FL SWITCH 3016T",
"product_id": "CSAFPID-11015",
"product_identification_helper": {
"model_numbers": [
"2891059"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4000T-8POE-2SFP-R",
"product": {
"name": "FL SWITCH 4000T-8POE-2SFP-R",
"product_id": "CSAFPID-11016",
"product_identification_helper": {
"model_numbers": [
"2891162"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4008T-2GT-3FX SM",
"product": {
"name": "FL SWITCH 4008T-2GT-3FX SM",
"product_id": "CSAFPID-11017",
"product_identification_helper": {
"model_numbers": [
"2891160"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4008T-2GT-4FX SM",
"product": {
"name": "FL SWITCH 4008T-2GT-4FX SM",
"product_id": "CSAFPID-11018",
"product_identification_helper": {
"model_numbers": [
"2891061"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4008T-2SFP",
"product": {
"name": "FL SWITCH 4008T-2SFP",
"product_id": "CSAFPID-11019",
"product_identification_helper": {
"model_numbers": [
"2891062"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4012T 2GT 2FX",
"product": {
"name": "FL SWITCH 4012T 2GT 2FX",
"product_id": "CSAFPID-11020",
"product_identification_helper": {
"model_numbers": [
"2891063"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4012T-2GT-2FX ST",
"product": {
"name": "FL SWITCH 4012T-2GT-2FX ST",
"product_id": "CSAFPID-11021",
"product_identification_helper": {
"model_numbers": [
"2891161"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4800E-24FX-4GC",
"product": {
"name": "FL SWITCH 4800E-24FX-4GC",
"product_id": "CSAFPID-11022",
"product_identification_helper": {
"model_numbers": [
"2891102"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4800E-24FX SM-4GC",
"product": {
"name": "FL SWITCH 4800E-24FX SM-4GC",
"product_id": "CSAFPID-11023",
"product_identification_helper": {
"model_numbers": [
"2891104"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX-4GC",
"product_id": "CSAFPID-11024",
"product_identification_helper": {
"model_numbers": [
"2891079"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX LC-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX LC-4GC",
"product_id": "CSAFPID-11025",
"product_identification_helper": {
"model_numbers": [
"2891073"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX SM-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX SM-4GC",
"product_id": "CSAFPID-11026",
"product_identification_helper": {
"model_numbers": [
"2891080"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX SM LC-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX SM LC-4GC",
"product_id": "CSAFPID-11027",
"product_identification_helper": {
"model_numbers": [
"2891074"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX SM ST-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX SM ST-4GC",
"product_id": "CSAFPID-11028",
"product_identification_helper": {
"model_numbers": [
"2891086"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4808E-16FX ST-4GC",
"product": {
"name": "FL SWITCH 4808E-16FX ST-4GC",
"product_id": "CSAFPID-11029",
"product_identification_helper": {
"model_numbers": [
"2891085"
]
}
}
},
{
"category": "product_name",
"name": "FL SWITCH 4824E-4GC",
"product": {
"name": "FL SWITCH 4824E-4GC",
"product_id": "CSAFPID-11030",
"product_identification_helper": {
"model_numbers": [
"2891072"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=1.33",
"product": {
"name": "Firmware \u003c=1.33",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version",
"name": "1.34",
"product": {
"name": "Firmware 1.34",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version_range",
"name": "\u003c1.0",
"product": {
"name": "Firmware \u003c1.0",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Phoenix Contact"
}
],
"product_groups": [
{
"group_id": "CSAFGID-0001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030"
],
"summary": "Affected products."
},
{
"group_id": "CSAFGID-0002",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021",
"CSAFPID-32022",
"CSAFPID-32023",
"CSAFPID-32024",
"CSAFPID-32025",
"CSAFPID-32026",
"CSAFPID-32027",
"CSAFPID-32028",
"CSAFPID-32029",
"CSAFPID-32030"
],
"summary": "Fixed products."
},
{
"group_id": "CSAFGID-0003",
"product_ids": [
"CSAFPID-32031",
"CSAFPID-32032",
"CSAFPID-32033",
"CSAFPID-32034",
"CSAFPID-32035",
"CSAFPID-32036",
"CSAFPID-32037",
"CSAFPID-32038",
"CSAFPID-32039",
"CSAFPID-32040",
"CSAFPID-32041",
"CSAFPID-32042",
"CSAFPID-32043",
"CSAFPID-32044",
"CSAFPID-32045",
"CSAFPID-32046",
"CSAFPID-32047",
"CSAFPID-32048",
"CSAFPID-32049",
"CSAFPID-32050",
"CSAFPID-32051",
"CSAFPID-32052",
"CSAFPID-32053",
"CSAFPID-32054",
"CSAFPID-32055",
"CSAFPID-32056",
"CSAFPID-32057",
"CSAFPID-32058",
"CSAFPID-32059",
"CSAFPID-32060"
],
"summary": "Not Affected Products."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3004T-FX",
"product_id": "CSAFPID-31001"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3004T-FX ST",
"product_id": "CSAFPID-31002"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3005",
"product_id": "CSAFPID-31003"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3005T",
"product_id": "CSAFPID-31004"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3006T-2FX",
"product_id": "CSAFPID-31005"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3006T-2FX SM",
"product_id": "CSAFPID-31006"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3006T-2FX ST",
"product_id": "CSAFPID-31007"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3008",
"product_id": "CSAFPID-31008"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3008T",
"product_id": "CSAFPID-31009"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3012E-2FX",
"product_id": "CSAFPID-31010"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3012E-2FX SM",
"product_id": "CSAFPID-31011"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3012E-2SFX",
"product_id": "CSAFPID-31012"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3016",
"product_id": "CSAFPID-31013"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3016E",
"product_id": "CSAFPID-31014"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 3016T",
"product_id": "CSAFPID-31015"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4000T-8POE-2SFP-R",
"product_id": "CSAFPID-31016"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4008T-2GT-3FX SM",
"product_id": "CSAFPID-31017"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4008T-2GT-4FX SM",
"product_id": "CSAFPID-31018"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4008T-2SFP",
"product_id": "CSAFPID-31019"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4012T 2GT 2FX",
"product_id": "CSAFPID-31020"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4012T-2GT-2FX ST",
"product_id": "CSAFPID-31021"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4800E-24FX-4GC",
"product_id": "CSAFPID-31022"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4800E-24FX SM-4GC",
"product_id": "CSAFPID-31023"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX-4GC",
"product_id": "CSAFPID-31024"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11024"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX LC-4GC",
"product_id": "CSAFPID-31025"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11025"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX SM-4GC",
"product_id": "CSAFPID-31026"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11026"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX SM LC-4GC",
"product_id": "CSAFPID-31027"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11027"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX SM ST-4GC",
"product_id": "CSAFPID-31028"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11028"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4808E-16FX ST-4GC",
"product_id": "CSAFPID-31029"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11029"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c=1.33 installed on FL SWITCH 4824E-4GC",
"product_id": "CSAFPID-31030"
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11030"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3004T-FX",
"product_id": "CSAFPID-32001"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3004T-FX ST",
"product_id": "CSAFPID-32002"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3005",
"product_id": "CSAFPID-32003"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3005T",
"product_id": "CSAFPID-32004"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3006T-2FX",
"product_id": "CSAFPID-32005"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3006T-2FX SM",
"product_id": "CSAFPID-32006"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3006T-2FX ST",
"product_id": "CSAFPID-32007"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3008",
"product_id": "CSAFPID-32008"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3008T",
"product_id": "CSAFPID-32009"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3012E-2FX",
"product_id": "CSAFPID-32010"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3012E-2FX SM",
"product_id": "CSAFPID-32011"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3012E-2SFX",
"product_id": "CSAFPID-32012"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3016",
"product_id": "CSAFPID-32013"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3016E",
"product_id": "CSAFPID-32014"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 3016T",
"product_id": "CSAFPID-32015"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4000T-8POE-2SFP-R",
"product_id": "CSAFPID-32016"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4008T-2GT-3FX SM",
"product_id": "CSAFPID-32017"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4008T-2GT-4FX SM",
"product_id": "CSAFPID-32018"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4008T-2SFP",
"product_id": "CSAFPID-32019"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4012T 2GT 2FX",
"product_id": "CSAFPID-32020"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4012T-2GT-2FX ST",
"product_id": "CSAFPID-32021"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4800E-24FX-4GC",
"product_id": "CSAFPID-32022"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4800E-24FX SM-4GC",
"product_id": "CSAFPID-32023"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX-4GC",
"product_id": "CSAFPID-32024"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11024"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX LC-4GC",
"product_id": "CSAFPID-32025"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11025"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX SM-4GC",
"product_id": "CSAFPID-32026"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11026"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX SM LC-4GC",
"product_id": "CSAFPID-32027"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11027"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX SM ST-4GC",
"product_id": "CSAFPID-32028"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11028"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4808E-16FX ST-4GC",
"product_id": "CSAFPID-32029"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11029"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 1.34 installed on FL SWITCH 4824E-4GC",
"product_id": "CSAFPID-32030"
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11030"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3004T-FX",
"product_id": "CSAFPID-32031"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3004T-FX ST",
"product_id": "CSAFPID-32032"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3005",
"product_id": "CSAFPID-32033"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3005T",
"product_id": "CSAFPID-32034"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3006T-2FX",
"product_id": "CSAFPID-32035"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3006T-2FX SM",
"product_id": "CSAFPID-32036"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11006"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3006T-2FX ST",
"product_id": "CSAFPID-32037"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11007"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3008",
"product_id": "CSAFPID-32038"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11008"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3008T",
"product_id": "CSAFPID-32039"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3012E-2FX",
"product_id": "CSAFPID-32040"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3012E-2FX SM",
"product_id": "CSAFPID-32041"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3012E-2SFX",
"product_id": "CSAFPID-32042"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11012"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3016",
"product_id": "CSAFPID-32043"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11013"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3016E",
"product_id": "CSAFPID-32044"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11014"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 3016T",
"product_id": "CSAFPID-32045"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11015"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4000T-8POE-2SFP-R",
"product_id": "CSAFPID-32046"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11016"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4008T-2GT-3FX SM",
"product_id": "CSAFPID-32047"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11017"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4008T-2GT-4FX SM",
"product_id": "CSAFPID-32048"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11018"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4008T-2SFP",
"product_id": "CSAFPID-32049"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11019"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4012T 2GT 2FX",
"product_id": "CSAFPID-32050"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11020"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4012T-2GT-2FX ST",
"product_id": "CSAFPID-32051"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11021"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4800E-24FX-4GC",
"product_id": "CSAFPID-32052"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11022"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4800E-24FX SM-4GC",
"product_id": "CSAFPID-32053"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11023"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX-4GC",
"product_id": "CSAFPID-32054"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11024"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX LC-4GC",
"product_id": "CSAFPID-32055"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11025"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX SM-4GC",
"product_id": "CSAFPID-32056"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11026"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX SM LC-4GC",
"product_id": "CSAFPID-32057"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11027"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX SM ST-4GC",
"product_id": "CSAFPID-32058"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11028"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4808E-16FX ST-4GC",
"product_id": "CSAFPID-32059"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11029"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c1.0 installed on FL SWITCH 4824E-4GC",
"product_id": "CSAFPID-32060"
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11030"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-10728",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"audience": "all",
"category": "description",
"text": "All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32003",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32006",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010",
"CSAFPID-32011",
"CSAFPID-32012",
"CSAFPID-32013",
"CSAFPID-32014",
"CSAFPID-32015",
"CSAFPID-32016",
"CSAFPID-32017",
"CSAFPID-32018",
"CSAFPID-32019",
"CSAFPID-32020",
"CSAFPID-32021",
"CSAFPID-32022",
"CSAFPID-32023",
"CSAFPID-32024",
"CSAFPID-32025",
"CSAFPID-32026",
"CSAFPID-32027",
"CSAFPID-32028",
"CSAFPID-32029",
"CSAFPID-32030"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030"
],
"known_not_affected": [
"CSAFPID-32031",
"CSAFPID-32032",
"CSAFPID-32033",
"CSAFPID-32034",
"CSAFPID-32035",
"CSAFPID-32036",
"CSAFPID-32037",
"CSAFPID-32038",
"CSAFPID-32039",
"CSAFPID-32040",
"CSAFPID-32041",
"CSAFPID-32042",
"CSAFPID-32043",
"CSAFPID-32044",
"CSAFPID-32045",
"CSAFPID-32046",
"CSAFPID-32047",
"CSAFPID-32048",
"CSAFPID-32049",
"CSAFPID-32050",
"CSAFPID-32051",
"CSAFPID-32052",
"CSAFPID-32053",
"CSAFPID-32054",
"CSAFPID-32055",
"CSAFPID-32056",
"CSAFPID-32057",
"CSAFPID-32058",
"CSAFPID-32059",
"CSAFPID-32060"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Customers using Phoenix Contact managed FL SWITCH devices with affected firmware versions are recommended to update the firmware to version 1.34 or higher which fixes this vulnerability. The updated firmware may be downloaded from the managed switch product page on the Phoenix Contact website:\n| Article No. | Model | Updated Firmware |\n|-------------|---------------------------------------|-------------------------------------------------------------------------------------------------------------|\n| 2891030 | FL SWITCH 3005 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3005-2891030?type=firmware_update) |\n| 2891032 | FL SWITCH 3005T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3005t-2891032?type=firmware_update) |\n| 2891033 | FL SWITCH 3004T-FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3004t-fx-2891033?type=firmware_update) |\n| 2891034 | FL SWITCH 3004T-FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3004t-fx-st-2891034?type=firmware_update) |\n| 2891031 | FL SWITCH 3008 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3008-2891031?type=firmware_update) |\n| 2891035 | FL SWITCH 3008T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3008t-2891035?type=firmware_update) |\n| 2891036 | FL SWITCH 3006T-2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-2891036?type=firmware_update) |\n| 2891037 | FL SWITCH 3006T-2FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-st-2891037?type=firmware_update) |\n| 2891067 | FL SWITCH 3012E-2SFX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2sfx-2891067?type=firmware_update) |\n| 2891066 | FL SWITCH 3016E | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016e-2891066?type=firmware_update) |\n| 2891058 | FL SWITCH 3016 | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016-2891058?type=firmware_update) |\n| 2891059 | FL SWITCH 3016T | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3016t-2891059?type=firmware_update) |\n| 2891060 | FL SWITCH 3006T-2FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3006t-2fx-sm-2891060?type=firmware_update) |\n| 2891062 | FL SWITCH 4008T-2SFP | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2sfp-2891062?type=firmware_update) |\n| 2891061 | FL SWITCH 4008T-2GT-4FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2gt-4fx-sm-2891061?type=firmware_update) |\n| 2891160 | FL SWITCH 4008T-2GT-3FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4008t-2gt-3fx-sm-2891160?type=firmware_update) |\n| 2891073 | FL SWITCH 4808E-16FX LC-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-lc-4gc-2891073?type=firmware_update) |\n| 2891080 | FL SWITCH 4808E-16FX SM-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-4gc-2891080?type=firmware_update) |\n| 2891086 | FL SWITCH 4808E-16FX SM ST-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-st-4gc-2891086?type=firmware_update) |\n| 2891085 | FL SWITCH 4808E-16FX ST-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-st-4gc-2891085?type=firmware_update) |\n| 2891079 | FL SWITCH 4808E-16FX-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-4gc-2891079?type=firmware_update) |\n| 2891074 | FL SWITCH 4808E-16FX SM LC-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4808e-16fx-sm-lc-4gc-2891074?type=firmware_update) |\n| 2891063 | FL SWITCH 4012T 2GT 2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4012t-2gt-2fx-2891063?type=firmware_update) |\n| 2891161 | FL SWITCH 4012T-2GT-2FX ST | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4012t-2gt-2fx-st-2891161?type=firmware_update) |\n| 2891072 | FL SWITCH 4824E-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4824e-4gc-2891072?type=firmware_update) |\n| 2891102 | FL SWITCH 4800E-24FX-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4800e-24fx-4gc-2891102?type=firmware_update) |\n| 2891104 | FL SWITCH 4800E-24FX SM-4GC | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-4800e-24fx-sm-4gc-2891104?type=firmware_update) |\n| 2891120 | FL SWITCH 3012E-2FX | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2fx-2891120?type=firmware_update) |\n| 2891119 | FL SWITCH 3012E-2FX SM | [Download Firmware](https://www.phoenixcontact.com/de-de/produkte/switch-fl-switch-3012e-2fx-sm-2891119?type=firmware_update) |\n| 2891162 | FL SWITCH 4000T-8POE-2SFP-R | please contact your local customer service |",
"group_ids": [
"CSAFGID-0001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31003",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31006",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010",
"CSAFPID-31011",
"CSAFPID-31012",
"CSAFPID-31013",
"CSAFPID-31014",
"CSAFPID-31015",
"CSAFPID-31016",
"CSAFPID-31017",
"CSAFPID-31018",
"CSAFPID-31019",
"CSAFPID-31020",
"CSAFPID-31021",
"CSAFPID-31022",
"CSAFPID-31023",
"CSAFPID-31024",
"CSAFPID-31025",
"CSAFPID-31026",
"CSAFPID-31027",
"CSAFPID-31028",
"CSAFPID-31029",
"CSAFPID-31030"
]
}
],
"title": "CVE-2018-10728"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.