CVE-2017-16723
CVSS V2 Medium 4.3
CVSS V3 Medium 6.1
Description
A Cross-site Scripting issue was discovered in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL COMSERVER UNI 232/422/485, FL COMSERVER BAS 232/422/485-T, FL COMSERVER UNI 232/422/485-T, FL COM SERVER RS232, FL COM SERVER RS485, and PSI-MODEM/ETH (running firmware versions prior to 1.99, 2.20, or 2.40). The cross-site scripting vulnerability has been identified, which may allow remote code execution.
Overview
- CVE ID
- CVE-2017-16723
- Assigner
- ics-cert@hq.dhs.gov
- Vulnerability Status
- Analyzed
- Published Version
- 2017-12-11T16:29:00
- Last Modified Date
- 2018-01-02T14:37:48
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_basic_232_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_basic_232:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_uni_422_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_uni_422:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_bas_485-t_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_bas_485-t:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_com_server_rs232_firmware:1.99:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_com_server_rs232:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_com_server_rs485_firmware:1.99:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_com_server_rs485:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:psi-modem\/eth_firmware:2.20:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:psi-modem\/eth:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_basic_422_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_basic_422:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_basic_485_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_basic_485:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_uni_485-t_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_uni_485-t:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_uni_485_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_uni_485:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_uni_232_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_uni_232:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_bas_422_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_bas_422:-:*:*:*:*:*:*:* | 0 | OR | ||
AND | ||||
cpe:2.3:o:phoenixcontact:fl_comserver_bas_232_firmware:2.40:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:phoenixcontact:fl_comserver_bas_232:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:N/C:N/I:P/A:N
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- PARTIAL
- Availability Impact
- NONE
- Base Score
- 4.3
- Severity
- MEDIUM
- Exploitability Score
- 8.6
- Impact Score
- 2.9
CVSS Version 3
- Version
- 3.0
- Vector String
- CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- REQUIRED
- Scope
- CHANGED
- Confidentiality Impact
- LOW
- Availability Impact
- NONE
- Base Score
- 6.1
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 2.7
References
Reference URL | Reference Tags |
---|---|
https://ics-cert.us-cert.gov/advisories/ICSA-17-341-03 | Issue Tracking Mitigation Third Party Advisory US Government Resource |
https://cert.vde.com/de-de/advisories/vde-2017-004 | Issue Tracking Third Party Advisory |
http://www.securityfocus.com/bid/102111 | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2017-16723 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16723 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 18:53:54 | Added to TrackCVE | |||
2022-12-02 23:53:16 | 2017-12-11T16:29Z | 2017-12-11T16:29:00 | CVE Published Date | updated |
2022-12-02 23:53:16 | 2018-01-02T14:37:48 | CVE Modified Date | updated | |
2022-12-02 23:53:16 | Analyzed | Vulnerability Status | updated |