In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| phoenixcontact | fl_switch_smcs_16tx_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_14tx\/2fx_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_14tx\/2fx-sm_firmware |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
15
Affected Products
2
References
phoenixcontact / fl_switch_smcs_16tx_firmware
| 4.70 |
| - |
| phoenixcontact | fl_switch_smcs_8gt_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_6gt\/2sfp_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_8tx-pn_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_4tx-pn_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_8tx_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smcs_6tx\/2sfp_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smn_6tx\/2pof-pn_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smn_8tx-pn_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smn_6tx\/2fx_firmware | 4.70 | - |
| phoenixcontact | fl_switch_smn_6tx\/2fx_sm_firmware | 4.70 | - |
| phoenixcontact | fl_nat_smn_8tx_firmware | 4.63 | - |
| phoenixcontact | fl_nat_smn_8tx-m_firmware | 4.63 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Exploitability
Impact