PHOENIX CONTACT FL SWITCH
The FL SWITCH 3xxx, 4xxx, and 48xx series contains multiple vulnerabilities in authentication, credential handling, and transport security. Attackers can read user credentials stored on the device (CWE-307), intercept unencrypted management traffic (CWE-319), bypass authorization checks (CWE-352), exploit weak input validation (CWE-119), or trigger denial of service (CWE-400). These vulnerabilities allow unauthenticated remote attackers with network access to compromise the confidentiality and integrity of the switch and potentially gain access to control system credentials or perform man-in-the-middle attacks on management traffic.
- Network access to the FL SWITCH management interface (HTTP port 80)
- No valid credentials required (unauthenticated attack possible)
- Switch running firmware version 1.35 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9e3fa685-13d9-44b8-846e-257b540743a9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.