Product:

Axl_f_bk_eth_firmware

(Phoenixcontact)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 2
Date Id Summary Products Score Patch Annotated
2021-06-25 CVE-2021-33540 In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists. Axl_f_bk_eip_ef_firmware, Axl_f_bk_eip_firmware, Axl_f_bk_eth_firmware, Axl_f_bk_eth_net2_firmware, Axl_f_bk_eth_xc_firmware, Axl_f_bk_pn_firmware, Axl_f_bk_pn_tps_firmware, Axl_f_bk_pn_tps_xc_firmware, Axl_f_bk_pn_xc_firmware, Axl_f_bk_s35_firmware, Axl_f_bk_sas_firmware, Il_eip_bk_di8_do4_2tx\-Pac_firmware, Il_eth_bk_di8_do4_2tx\-Pac_firmware, Il_eth_bk_di8_do4_2tx\-Xc\-Pac_firmware, Il_pn_bk\-Pac_firmware, Il_pn_bk_di8_do4_2scrj\-Pac_firmware, Il_pn_bk_di8_do4_2tx\-Pac_firmware, Il_s3_bk_di8_do4_2tx\-Pac_firmware 7.3
2020-02-18 CVE-2018-16994 An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required. Axl_f_bk_eth_firmware, Axl_f_bk_eth_xc_firmware, Axl_f_bk_pn_firmware N/A