PHOENIX CONTACT: Advisory for multiple FL Switch GHS utilising VxWorks
Wind River VxWorks TCP/IP stack (used in Phoenix Contact FL Switch GHS devices) contains two critical buffer overflow and TCP session manipulation vulnerabilities (CVE-2019-12255 and CVE-2019-12258). CVE-2019-12255 is triggered by TCP packets with the urgent flag set and urgent pointer = 0, causing an integer underflow and buffer overflow. This affects any device using TCP regardless of configuration or network role. CVE-2019-12258 allows attackers to reset established TCP sessions by injecting invalid TCP segments if they can determine the session's source/destination ports and IP addresses. Exploitation does not require the attacker to be directly connected—they can attack as a man-in-the-middle or by inducing the device to connect to a malicious host.
- Network access to the FL Switch GHS device (direct, routed, or as man-in-the-middle)
- The device must be using TCP/IP (standard for all network switches)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/86e2c0ea-6bc3-47b3-b141-01044cd36d53