PHOENIX CONTACT FL NAT SMx
Phoenix Contact FL NAT SMx industrial Ethernet switches are vulnerable to unauthorized access due to improper access controls on the web interface and SNMP services. Successful exploitation allows attackers to gain full access to device configuration without authentication. Affected models include FL NAT SMCS 8TX, FL NAT SMN 8TX-M-DMG, FL NAT SMN 8TX-M, and FL NAT SMN 8TX. No firmware patches are planned by the vendor. The vulnerability can be exploited over the network if the switch is reachable from an untrusted network segment, VPN connection, or the internet.
- Network access to the FL NAT switch on port 80, 443 (web UI) or port 161 (SNMP)
- No valid credentials required
- Device must be reachable from attacker's network segment or via VPN/internet if exposed
Patching may require device reboot — plan for process interruption
/api/v1/advisories/80487b7c-85e3-4a4c-a58a-016bbdc01ee1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.