Latest Phoenixcontact Vulnerabilities

PHOENIX CONTACT: PLCnext Control prone to download of code without integrity check
Phoenixcontact Axc F 1152 Firmware<=2024.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152 Firmware<=2024.0
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152 Firmware<=2024.0
Phoenixcontact Axc F 3152
and 11 more
Phoenix Contact: Classic line industrial controllers prone to inadequate integrity check of PLC
Phoenix Contact Automationworx
Phoenixcontact Axc 1050 Firmware
Phoenixcontact Axc 1050
Phoenixcontact Axc 1050 Xc Firmware
Phoenixcontact Axc 1050 Xc
Phoenixcontact Axc 3050 Firmware
and 25 more
PHOENIX CONTACT: Insufficient Read and Write Protection to Logic and Runtime Data in PLCnext Control
Phoenixcontact Axc F 1152 Firmware<=2024.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152 Firmware<=2024.0
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152 Firmware<=2024.0
Phoenixcontact Axc F 3152
and 11 more
Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource
Phoenix Contact Automationworx
Phoenixcontact Axc 1050 Firmware
Phoenixcontact Axc 1050
Phoenixcontact Axc 1050 Xc Firmware
Phoenixcontact Axc 1050 Xc
Phoenixcontact Axc 3050 Firmware
and 25 more
Phoenix Contact: ProConOs prone to Download of Code Without Integrity Check
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
Phoenix Contact ProConOS prone to Incorrect Permission Assignment for Critical Resource
Phoenixcontact Multiprog
Phoenixcontact Proconos Eclr
A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
Wibu CodeMeter Runtime<7.60c
Trumpf Oseon>=1.0.0<=3.0.22
Trumpf Programmingtube>=1.0.1<=4.6.3
Trumpf Teczonebend>=18.02.r8<=23.06.01
Trumpf Tops Unfold=05.03.00.00
Trumpf Topscalculation>=14.00<=22.00.00
and 19 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an authenticated remote attacker can execute code with root permissions with a specially crafted HTTP POST when uploading a ce...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with SNMPv2 write privileges may use an a special SNMP request to gain full access to the device.
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 an unauthenticated remote attacker can access upload-functions of the HTTP API. This might cause certificate errors for SSL-co...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 the SNMP daemon is running with root privileges allowing a remote attacker with knowledge of the SNMPv2 r/w community string t...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem through a configuration dia...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges is able to gain limited read-access to the device-filesystem within the embedded Qt brow...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote unauthenticated attacker can obtain the r/w community string of the SNMPv2 daemon.
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
PHOENIX CONTACT: Use of Hard-coded Credentials in WP 6xxx Web panels
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 18 more
PHOENIX CONTACT: Use of Hard-coded Credentials in WP 6xxx Web panels
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within ...
Phoenixcontact Cloud Client 1101t-tx Firmware<2.06.10
Phoenixcontact Cloud Client 1101t-tx
Phoenixcontact Tc Cloud Client 1002-4g Att Firmware<2.07.2
Phoenixcontact Tc Cloud Client 1002-4g Att
Phoenixcontact Tc Cloud Client 1002-4g Firmware<2.07.2
Phoenixcontact Tc Cloud Client 1002-4g
and 8 more
In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload ...
Phoenixcontact Cloud Client 1101t-tx Firmware<2.06.10
Phoenixcontact Cloud Client 1101t-tx
Phoenixcontact Tc Cloud Client 1002-4g Att Firmware<2.07.2
Phoenixcontact Tc Cloud Client 1002-4g Att
Phoenixcontact Tc Cloud Client 1002-4g Firmware<2.07.2
Phoenixcontact Tc Cloud Client 1002-4g
and 8 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP DELETE request to gain full access to the device.
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a specific HTTP POST releated to certificate operations to gain full access to t...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote, unauthenticated attacker may use an attribute of a specific HTTP POST request releated to date/time operations to ga...
Phoenixcontact Wp 6070-wvps Firmware<4.0.10
Phoenixcontact Wp 6070-wvps
Phoenixcontact Wp 6101-wxps Firmware<4.0.10
Phoenixcontact Wp 6101-wxps
Phoenixcontact Wp 6121-wxps Firmware<4.0.10
Phoenixcontact Wp 6121-wxps
and 6 more
Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the M...
Phoenixcontact Fl Mguard 2102 Firmware<=10.1.1
Phoenixcontact Fl Mguard 2102
Phoenixcontact Fl Mguard 4102 Pci Firmware<=10.1.1
Phoenixcontact Fl Mguard 4102 Pci
Phoenixcontact Fl Mguard 4102 Pcie Firmware<=10.1.1
Phoenixcontact Fl Mguard 4102 Pcie
and 46 more
In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via ...
Phoenixcontact Energy Axc Pu>=01.00.00.00<=04.15.00.00
Phoenixcontact Infobox Firmware>=01.00.00.00<=02.02.00.00
Phoenixcontact Infobox
Phoenixcontact Smartrtu Axc Sg Firmware>=01.00.00.00<=01.08.00.02
Phoenixcontact Smartrtu Axc Sg
Phoenixcontact Smartrtu Axc Ig Firmware>=01.00.00.00<=01.02.00.01
and 1 more
A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connection...
Phoenixcontact Fl Mguard Centerport Firmware<8.9.0
Phoenixcontact Fl Mguard Centerport
Phoenixcontact Fl Mguard Centerport Vpn-1000 Firmware<8.9.0
Phoenixcontact Fl Mguard Centerport Vpn-1000
Phoenixcontact Fl Mguard Core Tx Firmware<8.9.0
Phoenixcontact Fl Mguard Core Tx
and 56 more
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiali...
Phoenixcontact Automationworx Software Suite=1.89
In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or c...
Phoenixcontact Automationworx Software Suite=1.89
In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if c...
Phoenixcontact Fl Mguard Dm=1.12.0
Phoenixcontact Fl Mguard Dm=1.13.0
An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Axc 1050 Firmware
Phoenixcontact Axc 1050
Phoenixcontact Axc 1050 Xc Firmware
Phoenixcontact Axc 1050 Xc
Phoenixcontact Axc 3050 Firmware
Phoenixcontact Axc 3050
and 28 more
An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.
Phoenixcontact Multiprog
Phoenixcontact Proconos
Phoenixcontact-software Proconos Eclr
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper ...
Phoenixcontact Rad-ism-900-en-bd Firmware
Phoenixcontact Rad-ism-900-en-bd
Phoenixcontact Rad-ism-900-en-bd\/b Firmware
Phoenixcontact Rad-ism-900-en-bd\/b
Phoenixcontact Rad-ism-900-en-bd-bus Firmware
Phoenixcontact Rad-ism-900-en-bd-bus
On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an imprope...
Phoenixcontact Rad-ism-900-en-bd Firmware
Phoenixcontact Rad-ism-900-en-bd
Phoenixcontact Rad-ism-900-en-bd\/b Firmware
Phoenixcontact Rad-ism-900-en-bd\/b
Phoenixcontact Rad-ism-900-en-bd-bus Firmware
Phoenixcontact Rad-ism-900-en-bd-bus
In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.
Phoenixcontact Fl Switch 2005 Firmware=3.00
Phoenixcontact Fl Switch 2005
Phoenixcontact Fl Switch 2008 Firmware=3.00
Phoenixcontact Fl Switch 2008
Phoenixcontact Fl Switch 2008f Firmware=3.00
Phoenixcontact Fl Switch 2008f
and 124 more
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote ...
Phoenixcontact Fl Mguard 1102 Firmware=1.4.0
Phoenixcontact Fl Mguard 1102 Firmware=1.4.1
Phoenixcontact Fl Mguard 1102 Firmware=1.5.0
Phoenixcontact Fl Mguard 1102
Phoenixcontact Fl Mguard 1105 Firmware=1.4.0
Phoenixcontact Fl Mguard 1105 Firmware=1.4.1
and 2 more
In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated cer...
Phoenixcontact Fl Mguard 1102 Firmware=1.4.0
Phoenixcontact Fl Mguard 1102 Firmware=1.4.1
Phoenixcontact Fl Mguard 1102 Firmware=1.5.0
Phoenixcontact Fl Mguard 1102
Phoenixcontact Fl Mguard 1105 Firmware=1.4.0
Phoenixcontact Fl Mguard 1105 Firmware=1.4.1
and 2 more
Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of t...
Phoenixcontact Pc Worx<=1.88
Phoenixcontact Pc Worx Express<=1.88
Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.
Phoenixcontact Plcnext Technology Starterkit Firmware<2021.0.5
Phoenixcontact Plcnext Technology Starterkit
Phoenixcontact Axc F 2152 Starterkit Firmware<2021.0.5
Phoenixcontact Axc F 2152 Starterkit
Phoenixcontact Rfc 4072s Firmware<2021.0.5
Phoenixcontact Rfc 4072s
and 6 more
Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature auth...
Phoenixcontact Ilc1x0 Firmware
Phoenixcontact Ilc1x0
Phoenixcontact Ilc1x1 Firmware
Phoenixcontact Ilc1x1
Phoenix Contact Automationworx BCP File Parsing Memory Corruption Remote Code Execution Vulnerability
Phoenix Contact Automationworx
Phoenixcontact Config\+<=1.87
Phoenixcontact Pc Worx<=1.87
Phoenixcontact Pc Worx Express<=1.87
In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists.
Phoenixcontact Axl F Bk Pn Tps Xc Firmware<1.30
Phoenixcontact Axl F Bk Pn Tps Xc
Phoenixcontact Axl F Bk Pn Tps Firmware<1.30
Phoenixcontact Axl F Bk Pn Tps
Phoenixcontact Axl F Bk Eip Firmware<1.30
Phoenixcontact Axl F Bk Eip
and 30 more
In Phoenix Contact FL COMSERVER UNI in versions < 2.40 a invalid Modbus exception response can lead to a temporary denial of service.
Phoenixcontact Fl Comserver Uni 232\/422\/485 Firmware<2.40
Phoenixcontact Fl Comserver Uni 232\/422\/485
Phoenixcontact Fl Comserver Uni 232\/422\/485-t Firmware<2.40
Phoenixcontact Fl Comserver Uni 232\/422\/485-t
In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client.
Phoenixcontact Fl Switch Smcs 16tx Firmware<=4.70
Phoenixcontact Fl Switch Smcs 16tx
Phoenixcontact Fl Switch Smcs 14tx\/2fx Firmware<=4.70
Phoenixcontact Fl Switch Smcs 14tx\/2fx
Phoenixcontact Fl Switch Smcs 14tx\/2fx-sm Firmware<=4.70
Phoenixcontact Fl Switch Smcs 14tx\/2fx-sm
and 24 more
In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will c...
Phoenixcontact Fl Switch Smcs 16tx Firmware<=4.70
Phoenixcontact Fl Switch Smcs 16tx
Phoenixcontact Fl Switch Smcs 14tx\/2fx Firmware<=4.70
Phoenixcontact Fl Switch Smcs 14tx\/2fx
Phoenixcontact Fl Switch Smcs 14tx\/2fx-sm Firmware<=4.70
Phoenixcontact Fl Switch Smcs 14tx\/2fx-sm
and 24 more
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use this vulnerability i.e. to open a reverse shell with root privileges.
Phoenixcontact Plcnext Firmware<2021.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152
Phoenixcontact Rfc 4072s
Phoenixcontact Axc F 2152 Starterkit
and 1 more
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS a specially crafted LLDP packet may lead to a high system load in the PROFINET stack. An attacker can cause failure of system serv...
Phoenixcontact Plcnext Firmware<2021.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152
Phoenixcontact Rfc 4072s
Phoenixcontact Axc F 2152 Starterkit
and 1 more
On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LA...
Phoenixcontact Tc Mguard Rs4000 4g Vzw Vpn Firmware<8.8.3
Phoenixcontact Tc Mguard Rs4000 4g Vzw Vpn
Phoenixcontact Tc Mguard Rs4000 4g Att Vpn Firmware<8.8.3
Phoenixcontact Tc Mguard Rs4000 4g Att Vpn
Phoenixcontact Fl Mguard Rs4004 Tx\/dtx Firmware<8.8.3
Phoenixcontact Fl Mguard Rs4004 Tx\/dtx
and 12 more
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an attacker can use the knowledge gained by reading the insufficiently protected sensitive information to plan further attacks.
Phoenixcontact Plcnext Firmware<2021.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152
Phoenixcontact Rfc 4072s
Phoenixcontact Axc F 2152 Starterkit
and 1 more
On Phoenix Contact PLCnext Control Devices versions before 2021.0 LTS an authenticated low privileged user could embed malicious Javascript code to gain admin rights when the admin user visits the vul...
Phoenixcontact Plcnext Firmware<2021.0
Phoenixcontact Axc F 1152
Phoenixcontact Axc F 2152
Phoenixcontact Axc F 3152
Phoenixcontact Rfc 4072s
Phoenixcontact Axc F 2152 Starterkit
and 1 more
Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display con...
Phoenixcontact Btp 2043w Firmware
Phoenixcontact Btp 2043w
Phoenixcontact Btp 2070w Firmware
Phoenixcontact Btp 2070w
Phoenixcontact Btp 2102w Firmware
Phoenixcontact Btp 2102w
In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files.
Phoenixcontact Plcnext Engineer<=2020-3-1

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203