Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41694: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact FL SWITCH 2005

0
Medium
VulnerabilityCVE-2025-41694cvecve-2025-41694cwe-770
Published: Tue Dec 09 2025 (12/09/2025, 08:12:59 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

A low privileged remote attacker can run the webshell with an empty command containing whitespace. The server will then block until it receives more data, resulting in a DoS condition of the websserver.

AI-Powered Analysis

AILast updated: 12/16/2025, 10:34:53 UTC

Technical Analysis

CVE-2025-41694 is a vulnerability classified under CWE-770 (Allocation of Resources Without Limits or Throttling) affecting the Phoenix Contact FL SWITCH 2005. The flaw arises because the device's webshell interface does not properly handle empty commands that contain only whitespace characters. When such a command is sent remotely by an attacker with low privileges, the webserver enters a blocking state, waiting indefinitely for additional data that never arrives. This causes the webserver to hang, effectively denying service to legitimate users. The vulnerability does not require user interaction and can be exploited over the network (AV:N), with low attack complexity (AC:L) and only low privileges (PR:L). The impact is limited to availability (A:H), with no confidentiality or integrity compromise. The affected product is a network switch commonly used in industrial and automation environments, where continuous availability is critical. No patches or exploits are currently reported, but the vulnerability's nature suggests it could be weaponized to disrupt network operations by exhausting server resources. The lack of throttling or resource limits in handling webshell commands is the root cause, highlighting a design weakness in input validation and resource management.

Potential Impact

For European organizations, especially those in industrial automation, manufacturing, energy, and critical infrastructure sectors that deploy Phoenix Contact FL SWITCH 2005 devices, this vulnerability poses a significant risk to operational continuity. A successful exploitation could lead to denial of service on network switches, disrupting communication and control systems. This may result in downtime, loss of productivity, and potential safety hazards in industrial environments. Since the vulnerability affects availability only, the confidentiality and integrity of data remain intact; however, the operational impact can be severe. Given the widespread use of Phoenix Contact products in European industrial sectors, the threat could affect supply chains and critical services. The absence of known exploits currently reduces immediate risk, but the ease of exploitation and low privilege requirement mean attackers could develop exploits quickly. Organizations relying on these switches for network segmentation or control should consider this vulnerability a priority to address.

Mitigation Recommendations

1. Implement network-level access controls to restrict access to the webshell interface of FL SWITCH 2005 devices to trusted management networks only. 2. Monitor network traffic for anomalous patterns indicative of repeated empty or whitespace-only commands targeting the webshell. 3. Employ rate limiting or connection throttling at the network perimeter to mitigate potential DoS attempts. 4. Engage with Phoenix Contact support to obtain firmware updates or patches addressing this vulnerability as they become available. 5. If patches are not yet available, consider temporarily disabling or restricting webshell access where feasible. 6. Conduct regular vulnerability assessments and penetration testing focused on industrial control system components to detect exploitation attempts. 7. Maintain an incident response plan that includes scenarios for network device DoS to minimize downtime. 8. Segregate critical network segments to limit the impact of compromised or unavailable switches. These steps go beyond generic advice by focusing on network segmentation, monitoring, and vendor engagement specific to the affected product and vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2025-04-16T11:17:48.309Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6937da90964788758a8a3fce

Added to database: 12/9/2025, 8:15:12 AM

Last enriched: 12/16/2025, 10:34:53 AM

Last updated: 2/7/2026, 8:42:30 PM

Views: 59

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats