PHOENIX CONTACT: Multiple vulnerabilities in RAD-ISM-900-EN-BD devices
Multiple critical vulnerabilities exist in RAD-ISM-900-EN-BD remote access devices across firmware and third-party libraries: - BusyBox version 0.60.1 contains 13 known vulnerabilities affecting NTP and DHCP services - OpenSSL version 0.9.7-beta3 uses deprecated ciphers and has over 87 known vulnerabilities - The web application runs with root privileges, meaning any code execution achieved through the web interface would execute at the highest system privilege level The device family is end-of-life and Phoenix Contact will not release security updates. Mitigation relies entirely on network isolation and firewall protection.
- Network access to the web interface port of the RAD-ISM-900-EN-BD device
- High privileges or ability to exploit a web application vulnerability to bypass authentication
- Device must be reachable from the attacker's network position
/api/v1/advisories/e08d7f7b-686b-49bc-9740-b2e69f86a557Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.