PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities
Multiple code injection and hardcoded credential vulnerabilities (CWE-94, CWE-78, CWE-798) exist in Phoenix Contact TC Router and TC Cloud Client devices. These allow an attacker with valid user credentials to execute arbitrary code. The devices ship with a generic pre-installed X.509 certificate that should be replaced with an individual certificate during setup. Affected products: TC Cloud Client 1002-4G variants (≤2.03.17) and TC Cloud Client 1002-TXTX (≤1.03.17); TC Router 2002T-3G and 3002T-4G variants (≤2.05.3).
- Valid user credentials for the web management interface
- Network access to the device's management port (typically HTTP/HTTPS)
- Device running vulnerable firmware version (TC Cloud Client ≤2.03.17 or TC Router ≤2.05.3)
- Ability to send HTTP requests to the management interface
Patching may require device reboot — plan for process interruption
/api/v1/advisories/cac15cf7-e7a7-4d53-a2ed-46c61f60f802Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.