First published: Tue Nov 15 2022(Updated: )
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.
Credit: info@cert.vde.com
Affected Software | Affected Version | How to fix |
---|---|---|
Phoenixcontact Automationworx Software Suite | =1.89 |
Upgrade to Automation Worx Software Suite > 1.89
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-3461.
The severity of CVE-2022-3461 is high with a severity value of 7.8.
PHOENIX CONTACT Automationworx Software Suite version 1.89 is affected by CVE-2022-3461.
CVE-2022-3461 could lead to a heap buffer overflow and a read access violation, compromising the availability, integrity, or confidentiality of an application programming workstation.
Apply the necessary patches or updates provided by PHOENIX CONTACT Automationworx Software Suite to mitigate CVE-2022-3461.