Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22323: CWE-352 Cross-Site Request Forgery (CSRF) in Phoenix Contact FL SWITCH 2005

0
High
VulnerabilityCVE-2026-22323cvecve-2026-22323cwe-352
Published: Wed Mar 18 2026 (03/18/2026, 07:35:09 UTC)
Source: CVE Database V5
Vendor/Project: Phoenix Contact
Product: FL SWITCH 2005

Description

A CSRF vulnerability in the Link Aggregation configuration interface allows an unauthenticated remote attacker to trick authenticated users into sending unauthorized POST requests to the device by luring them to a malicious webpage. This can silently alter the device’s configuration without the victim’s knowledge or consent. Availability impact was set to low because after a successful attack the device will automatically recover without external intervention.

AI-Powered Analysis

AILast updated: 03/18/2026, 07:57:41 UTC

Technical Analysis

CVE-2026-22323 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Link Aggregation configuration interface of the Phoenix Contact FL SWITCH 2005. This vulnerability arises because the device's web interface does not adequately verify the origin of POST requests modifying critical network settings. An attacker can craft a malicious webpage that, when visited by an authenticated user of the device's management interface, causes the user's browser to send unauthorized POST requests to the device. These requests alter the Link Aggregation settings without the user's consent or awareness. The vulnerability requires no authentication or privileges on the attacker's part but does require that the victim is authenticated and visits the malicious page (user interaction). The device's availability impact is low since it automatically recovers after configuration changes, but the integrity of the device's network configuration is severely impacted. The vulnerability has a CVSS v3.1 score of 7.1, reflecting high severity due to ease of exploitation over the network and significant impact on configuration integrity. No patches or exploits in the wild are currently documented, but the risk remains significant given the critical role of network switches in industrial and enterprise environments.

Potential Impact

The primary impact of this vulnerability is on the integrity of the Phoenix Contact FL SWITCH 2005 device's configuration. Unauthorized changes to Link Aggregation settings can disrupt network traffic flow, degrade performance, or create network segmentation issues, potentially facilitating further attacks such as man-in-the-middle or denial of service. Although availability impact is low due to automatic recovery, repeated or targeted exploitation could cause intermittent network instability. Organizations relying on these switches in industrial control systems, manufacturing environments, or critical infrastructure may face operational disruptions, increased risk of lateral movement by attackers, and potential compliance violations. The silent nature of the attack means administrators may remain unaware of unauthorized changes, complicating incident response and forensic analysis.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Restrict access to the FL SWITCH 2005 management interface to trusted networks and users only, ideally via VPN or isolated management VLANs. 2) Employ web application firewalls (WAFs) or intrusion prevention systems (IPS) to detect and block suspicious POST requests targeting the device's configuration interface. 3) Educate users with access to the device management interface about the risks of visiting untrusted websites while authenticated. 4) Implement browser security controls such as SameSite cookies and Content Security Policy (CSP) headers to reduce CSRF risks where possible. 5) Monitor device configuration changes closely and maintain logs to detect unauthorized modifications promptly. 6) Engage with Phoenix Contact for firmware updates or patches addressing this vulnerability and apply them as soon as available. 7) Consider multi-factor authentication or additional authentication mechanisms if supported by the device to reduce the risk of unauthorized configuration changes. These steps go beyond generic advice by focusing on network segmentation, user education, and proactive monitoring tailored to this device and vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-07T11:49:15.178Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69ba579c771bdb17495548ff

Added to database: 3/18/2026, 7:43:24 AM

Last enriched: 3/18/2026, 7:57:41 AM

Last updated: 3/20/2026, 5:13:38 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses