CVE-2025-41752
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-19

Assigner: CERT VDE

Description
An XSS vulnerability in pxc_portSfp.php can be used by an unauthenticated remote attacker to trick an authenticated user to click on the link provided by the attacker in order to change parameters available via web based management (WBM). The vulnerability does not provide access to system-level resources such as operating system internals or privileged functions. Access is limited to device configuration parameters that are available in the context of the web application. The session cookie is secured by the httpOnly Flag. Therefore an attacker is not able to take over the session of an authenticated user.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-19
Generated
2026-05-07
AI Q&A
2025-12-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 138 associated CPEs
Vendor Product Version / Range
phoenixcontact fl_nat_2008_firmware to 3.50 (exc)
phoenixcontact fl_nat_2008 *
phoenixcontact fl_nat_2208_firmware to 3.50 (exc)
phoenixcontact fl_nat_2208 *
phoenixcontact fl_nat_2304-2gc-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_nat_2304-2gc-2sfp *
phoenixcontact fl_switch_2005_firmware to 3.50 (exc)
phoenixcontact fl_switch_2005 *
phoenixcontact fl_switch_2008_firmware to 3.50 (exc)
phoenixcontact fl_switch_2008 *
phoenixcontact fl_switch_2008f_firmware to 3.50 (exc)
phoenixcontact fl_switch_2008f *
phoenixcontact fl_switch_2016_firmware to 3.50 (exc)
phoenixcontact fl_switch_2016 *
phoenixcontact fl_switch_2105_firmware to 3.50 (exc)
phoenixcontact fl_switch_2105 *
phoenixcontact fl_switch_2108_firmware to 3.50 (exc)
phoenixcontact fl_switch_2108 *
phoenixcontact fl_switch_2116_firmware to 3.50 (exc)
phoenixcontact fl_switch_2116 *
phoenixcontact fl_switch_2204-2tc-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2204-2tc-2sfx *
phoenixcontact fl_switch_2205_firmware to 3.50 (exc)
phoenixcontact fl_switch_2205 *
phoenixcontact fl_switch_2206-2fx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2fx *
phoenixcontact fl_switch_2206-2fx_sm_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2fx_sm *
phoenixcontact fl_switch_2206-2fx_sm_st_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2fx_sm_st *
phoenixcontact fl_switch_2206-2fx_st_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2fx_st *
phoenixcontact fl_switch_2206-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2sfx *
phoenixcontact fl_switch_2206-2sfx_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206-2sfx_pn *
phoenixcontact fl_switch_2206c-2fx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2206c-2fx *
phoenixcontact fl_switch_2207-fx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2207-fx *
phoenixcontact fl_switch_2207-fx_sm_firmware to 3.50 (exc)
phoenixcontact fl_switch_2207-fx_sm *
phoenixcontact fl_switch_2208_firmware to 3.50 (exc)
phoenixcontact fl_switch_2208 *
phoenixcontact fl_switch_2208_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2208_pn *
phoenixcontact fl_switch_2208c_firmware to 3.50 (exc)
phoenixcontact fl_switch_2208c *
phoenixcontact fl_switch_2212-2tc-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2212-2tc-2sfx *
phoenixcontact fl_switch_2214-2fx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2214-2fx *
phoenixcontact fl_switch_2214-2fx_sm_firmware to 3.50 (exc)
phoenixcontact fl_switch_2214-2fx_sm *
phoenixcontact fl_switch_2214-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2214-2sfx *
phoenixcontact fl_switch_2214-2sfx_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2214-2sfx_pn *
phoenixcontact fl_switch_2216_firmware to 3.50 (exc)
phoenixcontact fl_switch_2216 *
phoenixcontact fl_switch_2216_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2216_pn *
phoenixcontact fl_switch_2303-8sp1 to 3.50 (exc)
phoenixcontact fl_switch_2303-8sp1 *
phoenixcontact fl_switch_2304-2gc-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2304-2gc-2sfp *
phoenixcontact fl_switch_2306-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2306-2sfp *
phoenixcontact fl_switch_2306-2sfp_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2306-2sfp_pn *
phoenixcontact fl_switch_2308_firmware to 3.50 (exc)
phoenixcontact fl_switch_2308 *
phoenixcontact fl_switch_2308_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2308_pn *
phoenixcontact fl_switch_2312-2gc-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2312-2gc-2sfp *
phoenixcontact fl_switch_2314-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2314-2sfp *
phoenixcontact fl_switch_2314-2sfp_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2314-2sfp_pn *
phoenixcontact fl_switch_2316_firmware to 3.50 (exc)
phoenixcontact fl_switch_2316 *
phoenixcontact fl_switch_2316\/k1_firmware to 3.50 (exc)
phoenixcontact fl_switch_2316\/k1 *
phoenixcontact fl_switch_2316_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2316_pn *
phoenixcontact fl_switch_2404-2tc-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2404-2tc-2sfx *
phoenixcontact fl_switch_2406-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2406-2sfx *
phoenixcontact fl_switch_2406-2sfx_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2406-2sfx_pn *
phoenixcontact fl_switch_2408_firmware to 3.50 (exc)
phoenixcontact fl_switch_2408 *
phoenixcontact fl_switch_2408_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2408_pn *
phoenixcontact fl_switch_2412-2tc-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2412-2tc-2sfx *
phoenixcontact fl_switch_2414-2sfx_firmware to 3.50 (exc)
phoenixcontact fl_switch_2414-2sfx *
phoenixcontact fl_switch_2414-2sfx_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2414-2sfx_pn *
phoenixcontact fl_switch_2416_firmware to 3.50 (exc)
phoenixcontact fl_switch_2416 *
phoenixcontact fl_switch_2416_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2416_pn *
phoenixcontact fl_switch_2504-2gc-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2504-2gc-2sfp *
phoenixcontact fl_switch_2506-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2506-2sfp *
phoenixcontact fl_switch_2506-2sfp\/k1_firmware to 3.50 (exc)
phoenixcontact fl_switch_2506-2sfp\/k1 *
phoenixcontact fl_switch_2506-2sfp_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2506-2sfp_pn *
phoenixcontact fl_switch_2508_firmware to 3.50 (exc)
phoenixcontact fl_switch_2508 *
phoenixcontact fl_switch_2508\/k1_firmware to 3.50 (exc)
phoenixcontact fl_switch_2508\/k1 *
phoenixcontact fl_switch_2508_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2508_pn *
phoenixcontact fl_switch_2512-2gc-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2512-2gc-2sfp *
phoenixcontact fl_switch_2514-2sfp_firmware to 3.50 (exc)
phoenixcontact fl_switch_2514-2sfp *
phoenixcontact fl_switch_2514-2sfp_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2514-2sfp_pn *
phoenixcontact fl_switch_2516_firmware to 3.50 (exc)
phoenixcontact fl_switch_2516 *
phoenixcontact fl_switch_2516_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2516_pn *
phoenixcontact fl_switch_2608_firmware to 3.50 (exc)
phoenixcontact fl_switch_2608 *
phoenixcontact fl_switch_2608_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2608_pn *
phoenixcontact fl_switch_2708_firmware to 3.50 (exc)
phoenixcontact fl_switch_2708 *
phoenixcontact fl_switch_2708_pn_firmware to 3.50 (exc)
phoenixcontact fl_switch_2708_pn *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, avoid clicking on suspicious or untrusted links that may exploit the XSS vulnerability in pxc_portSfp.php. Ensure that only authenticated users access the web-based management interface and consider restricting access to trusted networks. Since the vulnerability requires user interaction, educating users about phishing and social engineering risks is also recommended.


Can you explain this vulnerability to me?

This vulnerability is a Cross-Site Scripting (XSS) issue in the pxc_portSfp.php component. An unauthenticated remote attacker can exploit it by tricking an authenticated user into clicking a malicious link. This can cause the user to unknowingly change device configuration parameters via the web-based management interface. However, the attacker cannot access system-level resources or take over the user's session because the session cookie is protected by the httpOnly flag.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing an attacker to manipulate device configuration parameters through the web management interface if an authenticated user is tricked into clicking a malicious link. This could lead to unauthorized changes in device settings. However, it does not allow the attacker to gain system-level access or hijack user sessions.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart