PHOENIX CONTACT: Security Advisory for PLCNext, ILC 2050 BI, FL MGUARD DM UNLIMITED, TC ROUTER und CLOUD CLIENT products
Multiple OpenSSL 1.1.1 vulnerabilities (CWE-295: Improper Certificate Validation, CWE-476: NULL Pointer Dereference) exist in Phoenix Contact network-capable products. These flaws enable denial of service attacks (device crash/reboot) and bypass of certificate authority validation checks, potentially allowing man-in-the-middle attacks on encrypted communications. Affected product families include PLCnext controllers, ILC 2050 BI industrial PCs, TC ROUTER gateways, CLOUD CLIENT remote management devices, and FL MGUARD firewalls. Some products have vendor patches available, while others (CLOUD CLIENT 2002T series, ILC 2050 BI, TC ROUTER 4000 series, ENERGY AXC PU, SMARTRTU AXC series) have no fix planned.
- Network access to the device's Ethernet port or network segment where the device resides
- The device must accept inbound TLS/SSL connections or initiate outbound encrypted communications
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b54f9215-7b67-4013-9281-47357342b23e