Phoenix Contact: Security Advisory for AXL F BK and IL BK bus couplers
Phoenix Contact AXL F and IL bus couplers are vulnerable to a denial of service attack targeting port 80 (HTTP service). The vulnerability is a resource exhaustion issue (CWE-770) that can overload the device and degrade or halt network communications. The issue has been observed when network security scanners or tools probe port 80 on these devices. Some models have received firmware fixes (FW2.00 for AXL F BK PN variants, FW1.32 for AXL F BK ETH variants), while others are end-of-life with no planned fixes.
- Network access to port 80 (HTTP) on the bus coupler
- No authentication required—the HTTP service is accessible without credentials
- Attacker or scanner must be on the same network segment as the coupler or able to reach port 80 from the IT network
Patching may require device reboot — plan for process interruption
/api/v1/advisories/7fe3c20c-6e74-4d39-b1a8-93a45de94003Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.