PHOENIX CONTACT: Security Advisory for AXL F BK and IL BK products
An undocumented, hardcoded FTP credential provides unauthenticated root filesystem access to certain AXL F BK and IL BK devices. Phoenix Contact has released firmware patches for seven variants of the AXL F BK product family but has not addressed the vulnerability in the AXL F BK EIP (older hardware), ETH NET2, PN, PN XC, SAS, and all IL BK remote I/O product variants. The vendor recommends operating these devices in closed networks protected by a firewall. For patched devices, the firmware update disables the undocumented FTP service.
- Network reachability to the affected device on port 21 (FTP)
- Knowledge of the undocumented FTP credential (hardcoded in the device)
- No authentication bypass required beyond the hardcoded password
Patching may require device reboot — plan for process interruption
/api/v1/advisories/89b04b7c-a22f-4970-a8df-e42796ba5d54Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.