CVE-2021-33540

7.3 HIGH

📋 TL;DR

This vulnerability involves undocumented password-protected FTP access to the root directory in certain Phoenix Contact AXL F BK and IL BK devices. Attackers who discover the credentials can access sensitive system files and potentially modify device configurations. Organizations using these specific industrial control system devices are affected.

💻 Affected Systems

Products:
  • Phoenix Contact AXL F BK
  • Phoenix Contact IL BK
Versions: All versions prior to patching
Operating Systems: Embedded industrial control system
Default Config Vulnerable: ⚠️ Yes
Notes: The undocumented FTP access exists by default in affected devices. Specific device models within these product families may vary.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing configuration changes, firmware manipulation, or installation of persistent malware that could disrupt industrial operations.

🟠

Likely Case

Unauthorized access to sensitive configuration files, potential data exfiltration, and limited system manipulation by attackers who discover the credentials.

🟢

If Mitigated

No impact if proper network segmentation and access controls prevent external FTP access to these devices.

🌐 Internet-Facing: HIGH - FTP access exposed to internet could allow credential brute-forcing or exploitation if credentials are discovered.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this if they discover the credentials.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires discovering the undocumented FTP credentials, but once obtained, access is straightforward via standard FTP clients.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Contact Phoenix Contact for specific firmware updates

Vendor Advisory: https://cert.vde.com/en-us/advisories/vde-2021-021

Restart Required: Yes

Instructions:

1. Contact Phoenix Contact support for firmware updates. 2. Backup device configuration. 3. Apply firmware update following vendor instructions. 4. Restart device. 5. Verify FTP access is properly secured.

🔧 Temporary Workarounds

Network segmentation and firewall rules

all

Block FTP access to affected devices from untrusted networks

Disable FTP service if not required

all

Turn off FTP service on affected devices if file transfer functionality is not needed

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected devices from untrusted networks
  • Monitor FTP access logs for unauthorized connection attempts and credential guessing

🔍 How to Verify

Check if Vulnerable:

Attempt FTP connection to device port 21 using various credential combinations. Check device documentation for undocumented FTP access.

Check Version:

Check device firmware version through web interface or console. Contact Phoenix Contact for version verification.

Verify Fix Applied:

Verify FTP service is either disabled or properly secured with strong authentication. Test that undocumented credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed FTP authentication attempts
  • Successful FTP connections from unusual sources
  • FTP root directory access logs

Network Indicators:

  • FTP traffic to industrial control devices
  • Port 21 connections to affected devices

SIEM Query:

source_port=21 OR dest_port=21 AND (device_type="industrial_control" OR device_vendor="Phoenix Contact")

🔗 References

📤 Share & Export