CVE-2020-9435
Summary
| CVE | CVE-2020-9435 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-03-12 14:15:00 UTC |
| Updated | 2020-03-16 15:47:00 UTC |
| Description | PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certificate during installation. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| PHOENIX CONTACT: TC Router and TC Cloud Client multiple vulnerabilities — English (USA) | MISC | cert.vde.com | Third Party Advisory |
| Full Disclosure: SEC Consult SA-20200312-0 :: Authenticated Command Injection in Phoenix Contact TC Router & TC Cloud Client | FULLDISC | seclists.org | Exploit, Third Party Advisory |
| Phoenix Contact TC Router / TC Cloud Client Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory |
| Advisories — English (USA) | MISC | cert.vde.com | Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 591324 Phoenix Contact TC Router and TC Cloud Client Multiple Vulnerabilities (VDE-2020-003)