Phoenixcontact

Pc Worx

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 14.12.2023 14:15:43
  • Zuletzt bearbeitet 21.11.2024 08:27:58

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

  • EPSS 0.81%
  • Veröffentlicht 14.12.2023 14:15:42
  • Zuletzt bearbeitet 21.11.2024 08:27:57

Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.

  • EPSS 0.16%
  • Veröffentlicht 04.11.2021 10:15:07
  • Zuletzt bearbeitet 21.11.2024 06:10:47

Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.

  • EPSS 0.53%
  • Veröffentlicht 25.06.2021 19:15:09
  • Zuletzt bearbeitet 21.11.2024 06:09:03

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed beca...

  • EPSS 8.37%
  • Veröffentlicht 01.07.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:48

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

  • EPSS 0.68%
  • Veröffentlicht 01.07.2020 16:15:12
  • Zuletzt bearbeitet 21.11.2024 04:59:48

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data vali...

  • EPSS 7%
  • Veröffentlicht 31.10.2019 22:15:10
  • Zuletzt bearbeitet 21.11.2024 04:30:57

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs t...