Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22318: CWE-121 Stack-based Buffer Overflow in Phoenix Contact FL SWITCH 2005

0
Medium
VulnerabilityCVE-2026-22318cvecve-2026-22318cwe-121
Published: Wed Mar 18 2026 (03/18/2026, 07:33:55 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.

AI-Powered Analysis

AILast updated: 03/18/2026, 07:59:14 UTC

Technical Analysis

CVE-2026-22318 is a stack-based buffer overflow vulnerability identified in the Phoenix Contact FL SWITCH 2005 industrial network switch. The flaw exists in the device's file transfer parameter processing logic, where oversized POST parameters are not properly validated or bounded, leading to memory corruption on the stack. This corruption can cause the internal process handling these parameters to crash, resulting in a denial-of-service (DoS) condition that disrupts network operations dependent on the switch. The vulnerability requires an attacker to have high-level privileges on the device, implying that initial access or credential compromise is a prerequisite. The attack vector is network-based, with no user interaction required, making it feasible for remote exploitation once privileged access is obtained. The vulnerability is categorized under CWE-121 (stack-based buffer overflow), a common and well-understood class of memory corruption bugs. The CVSS v3.1 base score is 4.9, reflecting medium severity primarily due to the requirement for high privileges and the impact limited to availability disruption without confidentiality or integrity compromise. No patches or known exploits have been reported as of the publication date. The vulnerability highlights the importance of robust input validation and memory management in embedded network devices, especially those used in industrial control environments.

Potential Impact

The primary impact of this vulnerability is a denial-of-service condition on the Phoenix Contact FL SWITCH 2005 device, which can disrupt network connectivity and operations relying on this switch. For organizations, this can lead to temporary loss of network availability, affecting industrial control systems, automation processes, or critical infrastructure environments where these switches are deployed. Although the vulnerability does not allow data theft or manipulation, the resulting downtime can cause operational delays, safety risks, and financial losses. Since exploitation requires high privileges, the threat is mitigated somewhat by the need for prior access, but insider threats or lateral movement by attackers could leverage this flaw to cause disruption. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for organizations with these devices in their network, especially in sectors like manufacturing, energy, and critical infrastructure where Phoenix Contact products are common.

Mitigation Recommendations

1. Restrict network access to the management interfaces of FL SWITCH 2005 devices using network segmentation, firewalls, and access control lists to limit exposure to trusted administrators only. 2. Enforce strong authentication and credential management to prevent unauthorized privilege escalation that could enable exploitation. 3. Monitor device logs and network traffic for unusual POST requests or signs of memory corruption or process crashes. 4. Implement strict input validation and boundary checks in device firmware through vendor updates once patches become available. 5. Maintain an inventory of all Phoenix Contact FL SWITCH 2005 devices and prioritize patching or replacement as vendor fixes are released. 6. Employ network redundancy and failover mechanisms to minimize operational impact in case of device failure due to exploitation. 7. Conduct regular security assessments and penetration tests focusing on industrial control system components to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-07T11:49:15.178Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ba579c771bdb17495548f0

Added to database: 3/18/2026, 7:43:24 AM

Last enriched: 3/18/2026, 7:59:14 AM

Last updated: 3/19/2026, 5:42:07 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses