First published: Thu Oct 31 2019(Updated: )
An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenix Contact Automationworx | ||
Phoenixcontact Config\+ | <=1.86 | |
Phoenixcontact Pc Worx | <=1.86 | |
Phoenixcontact Pc Worx Express | <=1.86 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-16675 is high with a severity value of 7.8.
The affected software of CVE-2019-16675 is Phoenix Contact Automationworx with versions up to 1.86.
This vulnerability can be exploited by remote attackers who trick the user into visiting a malicious page or opening a malicious file.
To fix CVE-2019-16675, users should update to the latest version of Phoenix Contact Automationworx (version 1.86 or higher) as recommended by the vendor.
You can find more information about CVE-2019-16675 in the advisory links provided: [cert.vde.com](https://cert.vde.com/en-us/advisories), [us-cert.gov](https://www.us-cert.gov/ics/advisories/icsa-19-302-01), [zerodayiniative.com](https://www.zerodayinitiative.com/advisories/ZDI-19-922/).