{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-3526","assignerOrgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","state":"PUBLISHED","assignerShortName":"CERTVDE","dateReserved":"2023-07-06T15:05:52.953Z","datePublished":"2023-08-08T06:56:05.827Z","dateUpdated":"2025-02-27T21:10:47.251Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"CLOUD CLIENT 1101T-TX/TX","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.06.10","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC CLOUD CLIENT 1002-4G","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC CLOUD CLIENT 1002-4G ATT","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC CLOUD CLIENT 1002-4G VZW","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC ROUTER 3002T-4G","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC ROUTER 3002T-4G ATT","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]},{"defaultStatus":"unaffected","product":"TC ROUTER 3002T-4G VZW","vendor":"PHOENIX CONTACT","versions":[{"lessThan":"2.07.2","status":"affected","version":"0","versionType":"semver"}]}],"datePublic":"2023-08-08T06:45:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser."}],"value":"In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.6,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"270ccfa6-a436-4e77-922e-914ec3a9685c","shortName":"CERTVDE","dateUpdated":"2023-08-14T18:06:29.846Z"},"references":[{"url":"https://cert.vde.com/en/advisories/VDE-2023-017"},{"url":"http://seclists.org/fulldisclosure/2023/Aug/12"},{"url":"http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html"}],"source":{"defect":["CERT@VDE#64498"],"discovery":"UNKNOWN"},"title":"PHOENIX CONTACT: Cross-site Scripting vulnerability in TC ROUTER, TC CLOUD CLIENT and CLOUD CLIENT devices","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T06:55:03.356Z"},"title":"CVE Program Container","references":[{"url":"https://cert.vde.com/en/advisories/VDE-2023-017","tags":["x_transferred"]},{"url":"http://seclists.org/fulldisclosure/2023/Aug/12","tags":["x_transferred"]},{"url":"http://packetstormsecurity.com/files/174152/Phoenix-Contact-TC-Cloud-TC-Router-2.x-XSS-Memory-Consumption.html","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-02-26T21:54:22.893389Z","id":"CVE-2023-3526","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-27T21:10:47.251Z"}}]}}