Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2021-34570 : What You Need to Know

Discover the impact of CVE-2021-34570, a vulnerability in Phoenix Contact PLCnext control devices. Learn about the affected systems, exploitation method, and mitigation steps.

Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are vulnerable to a Denial of Service (DoS) attack through specially crafted JSON requests.

Understanding CVE-2021-34570

This CVE involves multiple Phoenix Contact PLCnext control devices being susceptible to a DoS attack due to a specific type of input.

What is CVE-2021-34570?

CVE-2021-34570 details a vulnerability in Phoenix Contact PLCnext control devices before version 2021.0.5 LTS that allows attackers to launch a DoS attack using crafted JSON requests.

The Impact of CVE-2021-34570

This vulnerability poses a high impact on the availability of affected devices, potentially leading to service disruption or unresponsiveness.

Technical Details of CVE-2021-34570

In this section, we will delve into the vulnerability description, affected systems and versions, as well as the exploitation mechanism.

Vulnerability Description

The vulnerability in Phoenix Contact PLCnext control devices arises from improper input validation, exposing them to DoS attacks through specially crafted JSON requests.

Affected Systems and Versions

Affected products include AXC F 1152, AXC F 2152, AXC F 3152, AXC F 2152 Starterkit, RFC 4072S, and PLCnext Technology Starterkit prior to 2021.0.5 LTS.

Exploitation Mechanism

Attackers can exploit this vulnerability by sending malicious JSON requests to the affected devices, triggering a DoS condition.

Mitigation and Prevention

To mitigate the risks associated with CVE-2021-34570, it is crucial to take immediate steps, adopt long-term security practices, and prioritize patching and updates.

Immediate Steps to Take

Operate network-capable devices in closed networks or behind firewalls to reduce exposure to potential attacks.

Long-Term Security Practices

Implement comprehensive security measures for network-capable devices to enhance resilience against cyber threats.

Patching and Updates

Phoenix Contact recommends affected users to upgrade to Firmware 2021.0.5 LTS or higher to remediate this vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now