First published: Wed Jul 01 2020(Updated: )
PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Pc Worx | <1.87 | |
Phoenixcontact Pc Worx Express | <=1.87 | |
Phoenix Contact Automationworx | ||
Phoenix Contact PC Worx version 1.87 and prior | ||
Phoenix Contact PC Worx Express version 1.87 and prior |
With the next version of Automation Worx Software Suite (Version > 1.87) a sharpened input data validation with respect to buffer size and description of size and number of objects referenced in a file will be implemented.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-12497.
The severity of CVE-2020-12497 is high with a severity value of 7.8.
Phoenix Contact Automationworx versions up to exclusive 1.87 and Phoenix Contact PC Worx versions up to inclusive 1.87 are affected.
This vulnerability can be exploited by remote attackers who can execute arbitrary code on affected installations of Phoenix Contact Automationworx.
Yes, user interaction is required to exploit this vulnerability. The target must visit a malicious page or open a malicious file.