Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22321: CWE-121 Stack-based Buffer Overflow in Phoenix Contact FL SWITCH 2005

0
Medium
VulnerabilityCVE-2026-22321cvecve-2026-22321cwe-121
Published: Wed Mar 18 2026 (03/18/2026, 07:34:36 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption.

AI-Powered Analysis

AILast updated: 03/18/2026, 07:58:37 UTC

Technical Analysis

CVE-2026-22321 identifies a stack-based buffer overflow vulnerability (CWE-121) in the Phoenix Contact FL SWITCH 2005 series, specifically within the Telnet and SSH command-line interface (CLI) login routine. The flaw arises when the device processes an oversized or malformed username input from an unauthenticated attacker attempting to log in via Telnet or SSH. This input exceeds the allocated buffer size on the stack, causing a buffer overflow that crashes the thread handling the login attempt. The crash forces the immediate closure of the affected session, but does not propagate to other active CLI sessions or the device’s overall operation. The vulnerability is remotely exploitable without authentication or user interaction, as it targets the login process itself. The CVSS v3.1 base score is 5.3 (medium), reflecting the vulnerability’s network attack vector, low complexity, no privileges required, no user interaction, and limited impact confined to availability. No patches or known exploits are currently available, and the vulnerability was published in March 2026. The affected product is a network switch commonly used in industrial and critical infrastructure environments, where reliable remote management access is essential. The vulnerability does not allow code execution or data compromise but could be leveraged to cause temporary denial of service on the management interface.

Potential Impact

The primary impact of CVE-2026-22321 is a limited denial of service (DoS) affecting the availability of individual Telnet/SSH login sessions on Phoenix Contact FL SWITCH 2005 devices. This could disrupt remote management access temporarily, potentially delaying administrative tasks or incident response actions. Since other CLI sessions and device functions remain unaffected, the overall operational impact is low. However, in environments where continuous remote management access is critical—such as industrial control systems, manufacturing plants, or critical infrastructure—this disruption could increase operational risk or complicate troubleshooting. The vulnerability does not compromise confidentiality or integrity, so data theft or manipulation is not a concern. The ease of exploitation (no authentication or user interaction required) means attackers with network access to the management interface could trigger the condition at will. While no exploits are known in the wild, the vulnerability could be used as part of a broader attack strategy to degrade network device availability or as a distraction during more severe attacks.

Mitigation Recommendations

To mitigate CVE-2026-22321, organizations should first monitor Phoenix Contact’s advisories for official patches or firmware updates addressing this vulnerability and apply them promptly once available. In the absence of patches, network segmentation and access control lists (ACLs) should be implemented to restrict Telnet and SSH access to trusted management networks or specific IP addresses, minimizing exposure to unauthenticated attackers. Disabling Telnet in favor of more secure management protocols, if feasible, can reduce attack surface. Employing network intrusion detection systems (NIDS) to monitor for anomalous oversized username inputs or repeated login failures may help detect exploitation attempts. Additionally, administrators should consider implementing rate limiting on login attempts to reduce the risk of repeated DoS triggers. Regularly auditing and hardening device configurations, including disabling unused services and enforcing strong authentication policies, will further reduce risk. Finally, maintaining an incident response plan that includes procedures for managing temporary loss of remote access is advisable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-07T11:49:15.178Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ba579c771bdb17495548f9

Added to database: 3/18/2026, 7:43:24 AM

Last enriched: 3/18/2026, 7:58:37 AM

Last updated: 3/20/2026, 7:02:29 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses