PHOENIX CONTACT FL COMSERVER, FL COM SERVER, and PSI-MODEM/ETH
A cross-site scripting (XSS) vulnerability exists in the web management interfaces of Phoenix Contact FL COMSERVER (all variants: RS232, RS485, BAS, BASIC, UNI) and PSI-MODEM/ETH devices. The vulnerability is caused by insufficient input validation on web form fields. An attacker can inject malicious JavaScript code that executes in the context of an authenticated user's browser session, potentially allowing unauthorized actions such as changing device settings, rebooting the device, or disrupting serial communications. Affected firmware versions are < 1.99, 2.20, and 2.40 across all product variants.
- Network access to the device's HTTP/HTTPS web interface (port 80/443 typical)
- User interaction required: victim must visit or interact with a page containing the injected malicious code
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6e11173e-35b3-4485-accf-96230722fb38Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.