CVE-2023-3526
📋 TL;DR
CVE-2023-3526 is a cross-site scripting (XSS) vulnerability in PHOENIX CONTACT TC ROUTER and TC CLOUD CLIENT devices that allows unauthenticated remote attackers to execute arbitrary JavaScript in users' browsers via the license viewer page. This affects organizations using these industrial networking devices for remote access or cloud connectivity. The vulnerability enables attackers to steal session cookies, redirect users, or perform actions on their behalf.
💻 Affected Systems
- PHOENIX CONTACT TC ROUTER
- PHOENIX CONTACT TC CLOUD CLIENT
- PHOENIX CONTACT CLOUD CLIENT 1101T-TX/TX
📦 What is this software?
Cloud Client 1101t Tx Firmware by Phoenixcontact
Tc Cloud Client 1002 4g Att Firmware by Phoenixcontact
View all CVEs affecting Tc Cloud Client 1002 4g Att Firmware →
Tc Cloud Client 1002 4g Firmware by Phoenixcontact
Tc Cloud Client 1002 4g Vzw Firmware by Phoenixcontact
View all CVEs affecting Tc Cloud Client 1002 4g Vzw Firmware →
Tc Router 3002t 4g Att Firmware by Phoenixcontact
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, take full control of affected devices, pivot to internal networks, and disrupt industrial operations or cause physical damage in critical infrastructure environments.
Likely Case
Attackers would steal session cookies to gain unauthorized access to device management interfaces, potentially modifying configurations, disrupting network connectivity, or using devices as footholds for further attacks.
If Mitigated
With proper network segmentation and access controls, impact would be limited to the specific device's management interface, preventing lateral movement to operational technology networks.
🎯 Exploit Status
Proof-of-concept exploit code is publicly available. The vulnerability requires minimal technical skill to exploit as it involves crafting malicious URLs that trigger JavaScript execution when visited by authenticated users.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: TC ROUTER and TC CLOUD CLIENT: 2.07.2; CLOUD CLIENT 1101T-TX/TX: 2.06.10
Vendor Advisory: https://cert.vde.com/en/advisories/VDE-2023-017
Restart Required: Yes
Instructions:
1. Download firmware updates from PHOENIX CONTACT support portal. 2. Backup device configuration. 3. Upload firmware via web interface or CLI. 4. Apply update and restart device. 5. Verify version after reboot.
🔧 Temporary Workarounds
Network Access Restriction
allRestrict access to device management interfaces using firewall rules to only allow connections from trusted administrative networks.
Web Application Firewall
allDeploy a WAF with XSS protection rules to filter malicious requests before they reach vulnerable devices.
🧯 If You Can't Patch
- Isolate affected devices in separate network segments with strict firewall rules preventing external access
- Disable remote management interfaces if not required and use local console access only
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface (System > Information) or CLI command 'show version'. Compare against affected versions.
Check Version:
Via web interface: Navigate to System > Information. Via CLI: Use 'show version' or 'system info' command.
Verify Fix Applied:
After patching, verify firmware version shows 2.07.2 or higher for TC ROUTER/TC CLOUD CLIENT, or 2.06.10 or higher for CLOUD CLIENT 1101T-TX/TX.
📡 Detection & Monitoring
Log Indicators:
- Unusual access patterns to license viewer pages
- Multiple failed authentication attempts followed by license page access
- Requests containing JavaScript payloads in URL parameters
Network Indicators:
- HTTP requests with encoded JavaScript in query strings targeting /license or similar endpoints
- Traffic from unexpected sources to device management ports (typically 80/443)
SIEM Query:
source="device_logs" AND (url="*license*" AND (param="*script*" OR param="*javascript*" OR param="*onload*" OR param="*onerror*"))
🔗 References
- http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
- http://seclists.org/fulldisclosure/2023/Aug/12
- https://cert.vde.com/en/advisories/VDE-2023-017
- http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html
- http://seclists.org/fulldisclosure/2023/Aug/12
- https://cert.vde.com/en/advisories/VDE-2023-017