PatchSiren cyber security CVE debrief
CVE-2016-9364 Fidelex CVE debrief
CVE-2016-9364 affects Fidelix FX-20 series controllers and is described as an arbitrary file reading issue caused by path traversal. The CVSS 3.0 vector in NVD indicates network access, no privileges, no user interaction, and high confidentiality impact. In practical defensive terms, this means an exposed controller service could allow an attacker to read files and directories they should not be able to access. The CVE description says versions prior to 11.50.19 are affected, and NVD lists vulnerable FX-2030A firmware/basic firmware through 11.50.18.
- Vendor
- Fidelex
- Product
- CVE-2016-9364
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-13
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-13
- Advisory updated
- 2026-05-13
Who should care
Organizations operating Fidelix FX-20 / FX-2030A controllers, especially teams responsible for OT/ICS asset inventory, patching, remote access controls, and server-side file exposure.
Technical summary
This is a CWE-22 path traversal weakness. According to the source corpus, the issue enables arbitrary file reading from the server, with no privileges required and no user interaction required. NVD maps the affected software CPEs to FX-2030A firmware and FX-2030A-basic firmware through version 11.50.18, while the CVE description states versions prior to 11.50.19 are impacted. The NVD CVSS vector is CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, which aligns with a confidentiality-focused exposure.
Defensive priority
High
Recommended defensive actions
- Inventory all Fidelix FX-20 / FX-2030A deployments and confirm firmware versions.
- Prioritize upgrading affected firmware to 11.50.19 or later, consistent with the CVE description.
- Restrict network access to controller management interfaces to trusted administrative hosts only.
- Segment affected controllers from untrusted networks and limit lateral reachability.
- Review logs and file-access telemetry for unusual requests that may indicate path traversal attempts.
- Validate whether any exposed interfaces are reachable from the internet or broader enterprise networks.
- Consult the linked ICS-CERT advisory for vendor guidance and deployment-specific mitigation steps.
Evidence notes
All findings here are limited to the supplied CVE/NVD corpus and linked references. NVD lists CWE-22 and the CVSS 3.0 vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The CVE description states arbitrary file reading via path traversal in Fidelix FX-20 series controllers prior to 11.50.19. NVD CPE data marks FX-2030A firmware/basic firmware through 11.50.18 as vulnerable. The source corpus also contains a naming inconsistency: the CVE description uses 'Fidelix' while the NVD CPE vendor string shows 'fidelex'.
Official resources
-
CVE-2016-9364 CVE record
CVE.org
-
CVE-2016-9364 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, US Government Resource
Publicly disclosed in the CVE/NVD record on 2017-02-13T21:59:02.173Z. The supplied record was last modified on 2026-05-13T00:24:29.033Z. No KEV listing was provided in the source corpus.