CVE-2025-41693: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact FL SWITCH 2005
A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.
AI Analysis
Technical Summary
CVE-2025-41693 identifies a resource exhaustion vulnerability in the Phoenix Contact FL SWITCH 2005 series. The flaw stems from improper handling of SSH sessions where a low privileged remote attacker can log in and execute commands directly. The process initiated by the attacker remains open and consumes system resources without any throttling or limits, leading to degraded performance of the device's management functions. Importantly, the core switching capabilities remain unaffected, so network traffic forwarding continues normally. The vulnerability is classified under CWE-770, which involves allocation of resources without adequate limits or throttling, allowing attackers to degrade system availability. The attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and affects availability only (A:L) with no confidentiality or integrity impact. The vulnerability was reserved in April 2025 and published in December 2025, with no known exploits in the wild to date. The affected product is the FL SWITCH 2005, a network switch commonly used in industrial and automation environments. No patches have been linked yet, so mitigation relies on access control and monitoring.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that deploy Phoenix Contact FL SWITCH 2005 devices, this vulnerability could lead to degraded management performance. While switching functions remain intact, impaired management could delay configuration changes, monitoring, and incident response, potentially increasing operational risk. Resource exhaustion could also cause denial of service conditions on management interfaces, complicating device administration. Given the reliance on these switches in sectors such as energy, manufacturing, and transportation across Europe, the vulnerability could indirectly affect operational continuity. However, since exploitation requires low privileged access via SSH, the risk is somewhat mitigated by existing network segmentation and access controls. No direct data confidentiality or integrity loss is expected, but availability of management functions is reduced.
Mitigation Recommendations
European organizations should implement strict SSH access controls to limit login to trusted administrators and management networks, ideally using network segmentation and VPNs. Monitoring SSH session behavior for abnormal resource consumption or persistent sessions can help detect exploitation attempts. Rate limiting or session timeouts on SSH connections, if configurable on the device, should be enabled to prevent resource exhaustion. Until a vendor patch is released, consider isolating FL SWITCH 2005 devices from untrusted networks and disabling SSH access where not strictly necessary. Regularly review and update device firmware and configuration to incorporate future patches addressing this vulnerability. Incident response plans should include procedures for managing degraded management interfaces. Additionally, network anomaly detection systems can be tuned to alert on unusual SSH activity targeting these devices.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland, Sweden
CVE-2025-41693: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact FL SWITCH 2005
Description
A low privileged remote attacker can use the ssh feature to execute commands directly after login. The process stays open and uses resources which leads to a reduced performance of the management functions. Switching functionality is not affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-41693 identifies a resource exhaustion vulnerability in the Phoenix Contact FL SWITCH 2005 series. The flaw stems from improper handling of SSH sessions where a low privileged remote attacker can log in and execute commands directly. The process initiated by the attacker remains open and consumes system resources without any throttling or limits, leading to degraded performance of the device's management functions. Importantly, the core switching capabilities remain unaffected, so network traffic forwarding continues normally. The vulnerability is classified under CWE-770, which involves allocation of resources without adequate limits or throttling, allowing attackers to degrade system availability. The attack vector is network-based (AV:N), requires low privileges (PR:L), no user interaction (UI:N), and affects availability only (A:L) with no confidentiality or integrity impact. The vulnerability was reserved in April 2025 and published in December 2025, with no known exploits in the wild to date. The affected product is the FL SWITCH 2005, a network switch commonly used in industrial and automation environments. No patches have been linked yet, so mitigation relies on access control and monitoring.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors that deploy Phoenix Contact FL SWITCH 2005 devices, this vulnerability could lead to degraded management performance. While switching functions remain intact, impaired management could delay configuration changes, monitoring, and incident response, potentially increasing operational risk. Resource exhaustion could also cause denial of service conditions on management interfaces, complicating device administration. Given the reliance on these switches in sectors such as energy, manufacturing, and transportation across Europe, the vulnerability could indirectly affect operational continuity. However, since exploitation requires low privileged access via SSH, the risk is somewhat mitigated by existing network segmentation and access controls. No direct data confidentiality or integrity loss is expected, but availability of management functions is reduced.
Mitigation Recommendations
European organizations should implement strict SSH access controls to limit login to trusted administrators and management networks, ideally using network segmentation and VPNs. Monitoring SSH session behavior for abnormal resource consumption or persistent sessions can help detect exploitation attempts. Rate limiting or session timeouts on SSH connections, if configurable on the device, should be enabled to prevent resource exhaustion. Until a vendor patch is released, consider isolating FL SWITCH 2005 devices from untrusted networks and disabling SSH access where not strictly necessary. Regularly review and update device firmware and configuration to incorporate future patches addressing this vulnerability. Incident response plans should include procedures for managing degraded management interfaces. Additionally, network anomaly detection systems can be tuned to alert on unusual SSH activity targeting these devices.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2025-04-16T11:17:48.309Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6937da90964788758a8a3fcb
Added to database: 12/9/2025, 8:15:12 AM
Last enriched: 12/9/2025, 8:23:43 AM
Last updated: 12/9/2025, 12:42:00 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
US Posts $10 Million Bounty for Iranian Hackers
MediumHow to Streamline Zero Trust Using the Shared Signals Framework
MediumNew ‘Broadside’ Botnet Poses Risk to Shipping Companies
MediumCVE-2024-52051: CWE-20: Improper Input Validation in Siemens SIMATIC S7-PLCSIM V17
HighCVE-2024-49849: CWE-502: Deserialization of Untrusted Data in Siemens SIMATIC S7-PLCSIM V16
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.