Fidelix FX-20 Series Controllers Path Traversal Vulnerability
The FX-20 series controllers contain a path traversal vulnerability in the web interface that allows an attacker to read arbitrary files from the controller's file system without authentication. By sending HTTP requests with path traversal sequences (../ characters), an attacker can bypass file access restrictions and retrieve sensitive files including configuration data and credentials. The vulnerability affects FX-20 controllers with firmware versions below 11.50.19. No patch is available from the vendor.
- Network access to the FX-20 controller's HTTP port (typically 80 or 443)
- The controller's web interface must be reachable from the attacker's network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c6d719d9-be04-4df8-93bc-913c0247bb52Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.