Several Vulnerabilities Expose Phoenix Contact Industrial 4G Routers to Attacks

Several potentially serious vulnerabilities have been discovered in some of the industrial 4G routers made by Phoenix Contact, a Germany-based provider of industrial automation, connectivity and interface solutions.


The security holes were discovered by cybersecurity consultancy SEC Consult and the vendor has released firmware updates that should patch the flaws.


The vulnerabilities affect various Phoenix Contact TC ROUTER and TC CLOUD CLIENT devices. TC ROUTER is a line of industrial 3G/4G routers designed for scenarios where a wired internet connection is not available. TC CLOUD CLIENT devices provide an industrial VPN gateway for remote maintenance via a 4G network.


SEC Consult has discovered three types of vulnerabilities affecting these routers. One of them, classified as critical and tracked as CVE-2020-9435, is related to the existence of a hardcoded certificate used for HTTPS. An attacker can leverage this certificate for man-in-the-middle (MitM) attacks, device impersonation, and passive decryption, allowing them to obtain administrator credentials and other sensitive information. The company told SecurityWeek that traffic can be intercepted by an attacker who is in proximity of the targeted router.


The Censys internet search engine shows that there are more than 200 internet-exposed devices using this certificate.


Germany’s VDE CERT says the pre-installed certificates should be replaced by users during the device’s initial configuration. The organization has provided instructions for carrying out this task and says the vendor will ship devices with individual cert ..

Support the originator by clicking the read the rest link below.