Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-21003 : Security Advisory and Response

Learn about CVE-2021-21003, a Denial of Service vulnerability impacting Phoenix Contact FL SWITCH SMCS series products. Explore the impact, affected systems, and mitigation steps.

A Denial of Service vulnerability has been discovered in Phoenix Contact FL SWITCH SMCS series products, affecting various versions. This vulnerability may lead to a disruption of Web-, SNMP-, and ICMP-Echo services.

Understanding CVE-2021-21003

This CVE involves a Denial of Service vulnerability in Phoenix Contact FL SWITCH SMCS series products, impacting multiple versions.

What is CVE-2021-21003?

The vulnerability allows attackers to exploit fragmented TCP packets, causing a Denial of Service affecting Web, SNMP, and ICMP-Echo services without impacting the device's switching functionality.

The Impact of CVE-2021-21003

With a CVSS base score of 5.3 (Medium Severity), this vulnerability could result in service disruptions, affecting network availability.

Technical Details of CVE-2021-21003

This section delves into the specifics of the CVE-2021-21003 vulnerability.

Vulnerability Description

In Phoenix Contact FL SWITCH SMCS series products, fragmented TCP packets can trigger a Denial of Service, affecting Web-, SNMP-, and ICMP-Echo services.

Affected Systems and Versions

The vulnerability impacts various Phoenix Contact FL SWITCH SMCS series products, including SMCS 16TX, SMCS 14TX/2FX, SMCS 8GT, SMN 8TX, and more.

Exploitation Mechanism

Attackers can exploit the vulnerability by sending fragmented TCP packets to the affected devices, leading to service disruptions.

Mitigation and Prevention

Discover the necessary steps to mitigate and prevent the CVE-2021-21003 vulnerability.

Immediate Steps to Take

Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall to mitigate the risk of exploitation.

Long-Term Security Practices

Implementing network segmentation, regular security updates, and monitoring for abnormal network activity are key to enhancing long-term security.

Patching and Updates

Stay informed about security patches and updates released by Phoenix Contact to address the vulnerability effectively.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now