First published: Thu Mar 12 2020(Updated: )
PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact TC Router 3002T-4G Firmware | <=2.05.3 | |
Phoenix Contact TC Router 3002T-4G Firmware | ||
Phoenixcontact TC Router 2002T-3G Firmware | <=2.05.3 | |
Phoenixcontact Tc Router 2002t-3g Firmware | ||
Phoenix Contact TC Router 3002T-4G Firmware | <=2.05.3 | |
Phoenix Contact TC Router 3002T-4G Firmware | ||
Phoenix Contact TC Router 3002T-4G Firmware | <=2.05.3 | |
Phoenix Contact TC Router 3002T-4G Firmware | ||
Phoenix Contact TC Cloud Client 1002-4G VZW | <=2.03.17 | |
Phoenix Contact TC Cloud Client | ||
Phoenixcontact TC Cloud Client 1002-txtx | <=1.03.17 | |
Phoenixcontact TC Cloud Client 1002-txtx Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-9436.
The severity of CVE-2020-9436 is critical with a CVSS score of 8.8.
The affected devices include PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17.
Authenticated users can exploit the vulnerability to inject system commands.
It is recommended to apply the latest firmware updates provided by PHOENIX CONTACT to mitigate the vulnerability.