CVE-2019-9201

9.8 CRITICAL

📋 TL;DR

CVE-2019-9201 is a critical authentication bypass vulnerability in Phoenix Contact industrial control devices that allows unauthenticated remote attackers to access TCP port 1962 and perform sensitive operations like creating backups, reading files, and modifying configurations. This affects Phoenix Contact ILC GSM/GPRS devices and potentially other industrial control systems, leaving over 1,200 ICS devices vulnerable to remote attacks.

💻 Affected Systems

Products:
  • Phoenix Contact ILC GSM/GPRS devices
  • Other Phoenix Contact industrial control devices
Versions: Multiple versions prior to vendor patches
Operating Systems: Embedded/ICS operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with port 1962 accessible are vulnerable. The vulnerability exists in the web interface/management functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of industrial control systems allowing attackers to modify configurations, steal sensitive data, disrupt operations, or cause physical damage to industrial processes.

🟠

Likely Case

Unauthorized access to device configurations, backup theft, potential modification of device settings leading to operational disruption.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external access to vulnerable devices.

🌐 Internet-Facing: HIGH - Devices exposed to the internet are directly vulnerable to unauthenticated remote attacks.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if they reach the vulnerable devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to port 1962. The Create Backup feature can be abused for directory traversal and file access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Vendor-specific firmware updates

Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2019-015/

Restart Required: Yes

Instructions:

1. Contact Phoenix Contact for specific firmware updates for affected devices. 2. Apply firmware patches according to vendor instructions. 3. Restart devices after patching. 4. Verify patch effectiveness.

🔧 Temporary Workarounds

Network Access Control

all

Block external access to port 1962/TCP using firewalls

iptables -A INPUT -p tcp --dport 1962 -j DROP
netsh advfirewall firewall add rule name="Block_Phoenix_Port_1962" dir=in action=block protocol=TCP localport=1962

Network Segmentation

all

Isolate vulnerable devices in separate network segments

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable devices from untrusted networks
  • Deploy intrusion detection systems to monitor for unauthorized access attempts on port 1962

🔍 How to Verify

Check if Vulnerable:

Test if port 1962/TCP is accessible and responds to connection attempts. Use nmap: nmap -p 1962 <target_ip>

Check Version:

Check device firmware version through web interface or vendor-specific management tools

Verify Fix Applied:

Verify port 1962 is no longer accessible or requires authentication. Check firmware version against vendor patched versions.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to port 1962
  • Backup creation events from unexpected sources
  • File access patterns indicating directory traversal

Network Indicators:

  • TCP connections to port 1962 from unauthorized sources
  • Unusual traffic patterns to industrial control devices

SIEM Query:

source_port=1962 OR dest_port=1962 AND (action=deny OR status=failure)

🔗 References

📤 Share & Export