Changeflow GovPing Data Privacy & Cybersecurity Phoenix Contact FL SWITCH Multiple Vulnerabilities
Priority review Notice Added Final

Phoenix Contact FL SWITCH Multiple Vulnerabilities

Favicon for wid.cert-bund.de CERT-Bund Security Advisories
Published March 17th, 2026
Detected March 18th, 2026
Email

Summary

CERT-Bund has issued a security advisory for Phoenix Contact FL SWITCH industrial network switches due to multiple vulnerabilities. The vulnerabilities could allow remote attackers to execute arbitrary code, cause denial-of-service, or manipulate data.

What changed

CERT-Bund has released advisory WID-SEC-2026-0765 detailing multiple critical vulnerabilities affecting Phoenix Contact FL SWITCH industrial network switches, specifically models 2xxx, TSN 23xx, and 59xx with firmware versions below 3.53. These vulnerabilities, with a CVSS Base Score of 7.2, can be exploited by remote attackers (authenticated or anonymous) to execute arbitrary code with administrator privileges, cause a denial-of-service, perform cross-site scripting attacks, or manipulate data.

Organizations utilizing these affected Phoenix Contact FL SWITCH devices should immediately review the advisory and apply available mitigation strategies. This includes updating firmware to a secure version or implementing compensating controls to prevent exploitation. Failure to address these vulnerabilities could lead to significant operational disruptions and security breaches within industrial control systems. The advisory indicates that mitigation is available, and users should consult the provided links for specific guidance and version history.

What to do next

  1. Review CERT-Bund advisory WID-SEC-2026-0765 for affected Phoenix Contact FL SWITCH models.
  2. Implement available mitigation strategies, including firmware updates, for vulnerable devices.
  3. Assess potential impact of vulnerabilities on operational systems and data integrity.

Source document (simplified)

[WID-SEC-2026-0765] Phoenix Contact FL SWITCH: Mehrere Schwachstellen CVSS Base Score 7.2 (hoch) CVSS Temporal Score 6.3 (mittel) Remoteangriff ja Datum 17.03.2026 Stand 18.03.2026 Mitigation ja

Betroffene Systeme

Betriebssystem

  • BIOS/Firmware

Produktbeschreibung

Produkte der FL SWITCH Reihe sind Industrielle Netzwerkswitches.

Produkte

17.03.2026
- Phoenix Contact FL SWITCH 2xxx <3.53

  • Phoenix Contact FL SWITCH TSN 23xx <3.53

  • Phoenix Contact FL SWITCH 59xx <3.53

Angriff

Angriff

Ein entfernter, authentisierter oder anonymer Angreifer kann mehrere Schwachstellen in Phoenix Contact FL SWITCH ausnutzen, um beliebigen Programmcode mit Administratorrechten auszuführen, einen Denial-of-Service-Zustand zu verursachen, Cross-Site-Scripting-Angriffe durchzuführen oder Daten zu manipulieren. CVE Informationen Versionshistorie Feedback zum Advisory geben

Source

Analysis generated by AI. Source diff and links are from the original.

Classification

Agency
CERT-Bund
Published
March 17th, 2026
Instrument
Notice
Legal weight
Non-binding
Stage
Final
Change scope
Substantive

Who this affects

Applies to
Manufacturers
Geographic scope
Germany

Taxonomy

Primary area
Cybersecurity
Operational domain
IT Security
Topics
Industrial Control Systems Network Security

Get Data Privacy & Cybersecurity alerts

Weekly digest. AI-summarized, no noise.

Free. Unsubscribe anytime.

Get alerts for this source

We'll email you when CERT-Bund Security Advisories publishes new changes.

Free. Unsubscribe anytime.