CVE-2026-22323: CWE-352 Cross-Site Request Forgery (CSRF) in Phoenix Contact FL SWITCH 2005
A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the victim’s knowledge or consent. Availability impact was set to low because after a successful attack the device will automatically recover without external intervention.
AI Analysis
Technical Summary
CVE-2026-22323 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Link Aggregation configuration interface of the Phoenix Contact FL SWITCH 2005. This vulnerability arises because the device's web interface does not adequately verify the origin of POST requests modifying critical network settings. An attacker can craft a malicious webpage that, when visited by an authenticated user of the device's management interface, causes the user's browser to send unauthorized POST requests to the device. These requests alter the Link Aggregation settings without the user's consent or awareness. The vulnerability requires no authentication or privileges on the attacker's part but does require that the victim is authenticated and visits the malicious page (user interaction). The device's availability impact is low since it automatically recovers after configuration changes, but the integrity of the device's network configuration is severely impacted. The vulnerability has a CVSS v3.1 score of 7.1, reflecting high severity due to ease of exploitation over the network and significant impact on configuration integrity. No patches or exploits in the wild are currently documented, but the risk remains significant given the critical role of network switches in industrial and enterprise environments.
Potential Impact
The primary impact of this vulnerability is on the integrity of the Phoenix Contact FL SWITCH 2005 device's configuration. Unauthorized changes to Link Aggregation settings can disrupt network traffic flow, degrade performance, or create network segmentation issues, potentially facilitating further attacks such as man-in-the-middle or denial of service. Although availability impact is low due to automatic recovery, repeated or targeted exploitation could cause intermittent network instability. Organizations relying on these switches in industrial control systems, manufacturing environments, or critical infrastructure may face operational disruptions, increased risk of lateral movement by attackers, and potential compliance violations. The silent nature of the attack means administrators may remain unaware of unauthorized changes, complicating incident response and forensic analysis.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Restrict access to the FL SWITCH 2005 management interface to trusted networks and users only, ideally via VPN or isolated management VLANs. 2) Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious POST requests targeting the device's configuration interface. 3) Educate users with access to the device management interface about the risks of visiting untrusted websites while authenticated. 4) Implement browser security controls such as SameSite cookies and Content Security Policy (CSP) headers to reduce CSRF risks where possible. 5) Monitor device configuration changes closely and maintain logs to detect unauthorized modifications promptly. 6) Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them as soon as available. 7) Consider multi-factor authentication or additional authentication mechanisms if supported by the device to reduce the risk of unauthorized configuration changes. These steps go beyond generic advice by focusing on network segmentation, user education, and proactive monitoring tailored to this device and vulnerability.
Affected Countries
Germany, United States, China, Japan, South Korea, France, United Kingdom, Italy, Canada, Australia
CVE-2026-22323: CWE-352 Cross-Site Request Forgery (CSRF) in Phoenix Contact FL SWITCH 2005
Description
A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the victim’s knowledge or consent. Availability impact was set to low because after a successful attack the device will automatically recover without external intervention.
AI-Powered Analysis
Technical Analysis
CVE-2026-22323 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Link Aggregation configuration interface of the Phoenix Contact FL SWITCH 2005. This vulnerability arises because the device's web interface does not adequately verify the origin of POST requests modifying critical network settings. An attacker can craft a malicious webpage that, when visited by an authenticated user of the device's management interface, causes the user's browser to send unauthorized POST requests to the device. These requests alter the Link Aggregation settings without the user's consent or awareness. The vulnerability requires no authentication or privileges on the attacker's part but does require that the victim is authenticated and visits the malicious page (user interaction). The device's availability impact is low since it automatically recovers after configuration changes, but the integrity of the device's network configuration is severely impacted. The vulnerability has a CVSS v3.1 score of 7.1, reflecting high severity due to ease of exploitation over the network and significant impact on configuration integrity. No patches or exploits in the wild are currently documented, but the risk remains significant given the critical role of network switches in industrial and enterprise environments.
Potential Impact
The primary impact of this vulnerability is on the integrity of the Phoenix Contact FL SWITCH 2005 device's configuration. Unauthorized changes to Link Aggregation settings can disrupt network traffic flow, degrade performance, or create network segmentation issues, potentially facilitating further attacks such as man-in-the-middle or denial of service. Although availability impact is low due to automatic recovery, repeated or targeted exploitation could cause intermittent network instability. Organizations relying on these switches in industrial control systems, manufacturing environments, or critical infrastructure may face operational disruptions, increased risk of lateral movement by attackers, and potential compliance violations. The silent nature of the attack means administrators may remain unaware of unauthorized changes, complicating incident response and forensic analysis.
Mitigation Recommendations
To mitigate this vulnerability, organizations should implement the following specific measures: 1) Restrict access to the FL SWITCH 2005 management interface to trusted networks and users only, ideally via VPN or isolated management VLANs. 2) Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious POST requests targeting the device's configuration interface. 3) Educate users with access to the device management interface about the risks of visiting untrusted websites while authenticated. 4) Implement browser security controls such as SameSite cookies and Content Security Policy (CSP) headers to reduce CSRF risks where possible. 5) Monitor device configuration changes closely and maintain logs to detect unauthorized modifications promptly. 6) Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them as soon as available. 7) Consider multi-factor authentication or additional authentication mechanisms if supported by the device to reduce the risk of unauthorized configuration changes. These steps go beyond generic advice by focusing on network segmentation, user education, and proactive monitoring tailored to this device and vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- CERTVDE
- Date Reserved
- 2026-01-07T11:49:15.178Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ba579c771bdb17495548ff
Added to database: 3/18/2026, 7:43:24 AM
Last enriched: 3/18/2026, 7:57:41 AM
Last updated: 3/20/2026, 5:13:38 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.