First published: Thu Mar 12 2020(Updated: )
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Tc Router 3002t-4g Firmware | <=2.05.3 | |
Phoenixcontact Tc Router 3002t-4g | ||
Phoenixcontact Tc Router 2002t-3g Firmware | <=2.05.3 | |
Phoenixcontact Tc Router 2002t-3g | ||
Phoenixcontact Tc Router 3002t-4g Vzw Firmware | <=2.05.3 | |
Phoenixcontact Tc Router 3002t-4g Vzw | ||
Phoenixcontact Tc Router 3002t-4g Att Firmware | <=2.05.3 | |
Phoenixcontact Tc Router 3002t-4g Att | ||
Phoenixcontact Tc Cloud Client 1002-4g Firmware | <=2.03.17 | |
Phoenixcontact Tc Cloud Client 1002-4g | ||
Phoenixcontact Tc Cloud Client 1002-txtx Firmware | <=1.03.17 | |
Phoenixcontact Tc Cloud Client 1002-txtx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-9436.
The severity of CVE-2020-9436 is critical with a CVSS score of 8.8.
The affected devices include PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17.
Authenticated users can exploit the vulnerability to inject system commands.
It is recommended to apply the latest firmware updates provided by PHOENIX CONTACT to mitigate the vulnerability.