CVE-2021-21002

7.5 HIGH

📋 TL;DR

This vulnerability affects Phoenix Contact FL COMSERVER UNI devices running firmware versions below 2.40. An attacker can send specially crafted invalid Modbus exception responses to cause a temporary denial of service, disrupting industrial communication. This impacts organizations using these industrial communication servers in operational technology environments.

💻 Affected Systems

Products:
  • Phoenix Contact FL COMSERVER UNI
Versions: All versions < 2.40
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices in default configuration when using Modbus protocol. Requires network access to the device's communication ports.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Critical industrial processes could be disrupted due to communication failure between PLCs and SCADA systems, potentially causing production downtime or safety issues.

🟠

Likely Case

Temporary disruption of Modbus communications between industrial devices, requiring manual restart of affected communication servers.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; affected devices automatically recover after temporary disruption.

🌐 Internet-Facing: HIGH if devices are directly exposed to internet without proper firewalls, as exploit requires only network access.
🏢 Internal Only: MEDIUM as attackers would need internal network access, but industrial networks often have less security monitoring than IT networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending malformed Modbus exception packets to the device. No authentication needed if network access is available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.40

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-022

Restart Required: Yes

Instructions:

1. Download firmware version 2.40 from Phoenix Contact support portal. 2. Backup current configuration. 3. Upload new firmware via web interface or configuration tool. 4. Restart device. 5. Verify firmware version shows 2.40.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate FL COMSERVER UNI devices in dedicated industrial network segments with strict firewall rules.

Access Control Lists

all

Implement network ACLs to restrict which devices can communicate with the COMSERVER on Modbus ports (typically TCP 502).

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Deploy intrusion detection systems to monitor for malformed Modbus traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface (http://device-ip) or configuration tool. If version is below 2.40, device is vulnerable.

Check Version:

Connect to device web interface at http://[device-ip] and navigate to System Information page

Verify Fix Applied:

After updating, verify firmware version shows 2.40 in web interface or configuration tool.

📡 Detection & Monitoring

Log Indicators:

  • Device restart logs
  • Communication failure events in industrial system logs

Network Indicators:

  • Unusual Modbus exception response patterns
  • Multiple malformed Modbus packets from single source

SIEM Query:

source="industrial_network" AND (protocol="modbus" AND (exception_code="invalid" OR packet_size="abnormal"))

🔗 References

📤 Share & Export