Learn about CVE-2019-9201, a critical vulnerability in Phoenix Contact devices allowing remote attackers to establish TCP sessions on port 1962, potentially leading to unauthorized access and data manipulation. Find mitigation steps and prevention measures here.
Remote attackers can exploit vulnerabilities in various Phoenix Contact devices to establish TCP sessions on port 1962, allowing unauthorized access to sensitive information and data manipulation.
Understanding CVE-2019-9201
This CVE involves multiple Phoenix Contact devices that are susceptible to remote attacks, potentially leading to unauthorized access and data manipulation.
What is CVE-2019-9201?
CVE-2019-9201 allows attackers to create TCP sessions on port 1962 in Phoenix Contact devices, enabling them to retrieve sensitive data or modify information. An attack scenario includes leveraging the Create Backup feature to navigate through directories.
The Impact of CVE-2019-9201
The vulnerability has a CVSS base score of 9.8, indicating a critical severity level. The impact includes high confidentiality and integrity risks, with attackers requiring no privileges to exploit the vulnerability.
Technical Details of CVE-2019-9201
Phoenix Contact devices are affected by this vulnerability, potentially exposing them to unauthorized access and data manipulation.
Vulnerability Description
The vulnerability allows remote attackers to establish TCP sessions on port 1962, leading to unauthorized access and potential data manipulation, such as retrieving sensitive information.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
To address CVE-2019-9201, immediate steps and long-term security practices are essential.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates