Phoenix Contact FL SWITCH Multiple Vulnerabilities
Summary
CERT-Bund has issued a security advisory for Phoenix Contact FL SWITCH industrial network switches due to multiple vulnerabilities. The vulnerabilities could allow remote attackers to execute arbitrary code, cause denial-of-service, or manipulate data.
What changed
CERT-Bund has released advisory WID-SEC-2026-0765 detailing multiple critical vulnerabilities affecting Phoenix Contact FL SWITCH industrial network switches, specifically models 2xxx, TSN 23xx, and 59xx with firmware versions below 3.53. These vulnerabilities, with a CVSS Base Score of 7.2, can be exploited by remote attackers (authenticated or anonymous) to execute arbitrary code with administrator privileges, cause a denial-of-service, perform cross-site scripting attacks, or manipulate data.
Organizations utilizing these affected Phoenix Contact FL SWITCH devices should immediately review the advisory and apply available mitigation strategies. This includes updating firmware to a secure version or implementing compensating controls to prevent exploitation. Failure to address these vulnerabilities could lead to significant operational disruptions and security breaches within industrial control systems. The advisory indicates that mitigation is available, and users should consult the provided links for specific guidance and version history.
What to do next
- Review CERT-Bund advisory WID-SEC-2026-0765 for affected Phoenix Contact FL SWITCH models.
- Implement available mitigation strategies, including firmware updates, for vulnerable devices.
- Assess potential impact of vulnerabilities on operational systems and data integrity.
Source document (simplified)
[WID-SEC-2026-0765] Phoenix Contact FL SWITCH: Mehrere Schwachstellen CVSS Base Score 7.2 (hoch) CVSS Temporal Score 6.3 (mittel) Remoteangriff ja Datum 17.03.2026 Stand 18.03.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- BIOS/Firmware
Produktbeschreibung
Produkte der FL SWITCH Reihe sind Industrielle Netzwerkswitches.
Produkte
17.03.2026
- Phoenix Contact FL SWITCH 2xxx <3.53
Phoenix Contact FL SWITCH TSN 23xx <3.53
Phoenix Contact FL SWITCH 59xx <3.53
Angriff
Angriff
Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Phoenix Contact FL SWITCH ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial-of-Service-Zustand zu verursachen, Cross-Site-Scripting-Angriffe durchzuführen oder Daten zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Source
Classification
Who this affects
Taxonomy
Browse Categories
Get Data Privacy & Cybersecurity alerts
Weekly digest. AI-summarized, no noise.
Free. Unsubscribe anytime.
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.