phoenixcontact CVE Vulnerabilities & Metrics

Focus on phoenixcontact vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About phoenixcontact Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with phoenixcontact. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total phoenixcontact CVEs: 110
Earliest CVE date: 10 Sep 2009, 10:30 UTC
Latest CVE date: 10 Sep 2024, 09:15 UTC

Latest CVE reference: CVE-2024-7699

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 32

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 190.91%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 190.91%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical phoenixcontact CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.65

Max CVSS: 10.0

Critical CVEs (≥9): 11

CVSS Range vs. Count

Range Count
0.0-3.9 48
4.0-6.9 43
7.0-8.9 9
9.0-10.0 11

CVSS Distribution Chart

Top 5 Highest CVSS phoenixcontact CVEs

These are the five CVEs with the highest CVSS scores for phoenixcontact, sorted by severity first and recency.

All CVEs for phoenixcontact

CVE-2024-7699 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

An low privileged remote attacker can execute OS commands with root privileges due to improper neutralization of special elements in user data.

CVE-2024-7698 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can get access to CSRF tokens of higher privileged users which can be abused to mount CSRF attacks.

CVE-2024-43393 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP FW_RULESETS.FROM_IP FW_RULESETS.IN_IP environment variable which can lead to a DoS.

CVE-2024-43392 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_INCOMING.FROM_IP FW_INCOMING.IN_IP FW_OUTGOING.FROM_IP FW_OUTGOING.IN_IP environment variable which can lead to a DoS.

CVE-2024-43391 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can perform configuration changes of the firewall services, including packet filter, packet forwarding, network access control or NAT through the FW_PORTFORWARDING.SRC_IP environment variable which can lead to a DoS.

CVE-2024-43390 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can perform configuration changes of the firewall services, including packet forwarding or NAT through the FW_NAT.IN_IP environment variable which can lead to a DoS.

CVE-2024-43389 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can perform configuration changes of the ospf service through OSPF_INTERFACE.SIMPLE_KEY, OSPF_INTERFACE.DIGEST_KEY environment variables which can lead to a DoS.

CVE-2024-43388 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker with write permissions can reconfigure the SNMP service due to improper input validation.

CVE-2024-43387 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can read and write files as root due to improper neutralization of special elements in the variable EMAIL_RELAY_PASSWORD in mGuard devices.

CVE-2024-43386 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable EMAIL_NOTIFICATION.TO in mGuard devices.

CVE-2024-43385 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 09:15 UTC

A low privileged remote attacker can trigger the execution of arbitrary OS commands as root due to improper neutralization of special elements in the variable PROXY_HTTP_PORT in mGuard devices.

CVE-2024-7734 phoenixcontact vulnerability CVSS: 0 10 Sep 2024, 08:15 UTC

An unauthenticated remote attacker can exploit the behavior of the pathfinder TCP encapsulation service by establishing a high number of TCP connections to the pathfinder TCP encapsulation service. The impact is limited to blocking of valid IPsec VPN peers.

CVE-2024-6788 phoenixcontact vulnerability CVSS: 0 13 Aug 2024, 14:15 UTC

A remote unauthenticated attacker can use the firmware update feature on the LAN interface of the device to reset the password for the predefined, low-privileged user “user-app” to the default password.

CVE-2024-3913 phoenixcontact vulnerability CVSS: 0 13 Aug 2024, 13:15 UTC

An unauthenticated remote attacker can use this vulnerability to change the device configuration due to a file writeable for short time after system startup.

CVE-2024-28137 phoenixcontact vulnerability CVSS: 0 14 May 2024, 16:16 UTC

A local attacker with low privileges can perform a privilege escalation with an init script due to a TOCTOU vulnerability.

CVE-2024-28136 phoenixcontact vulnerability CVSS: 0 14 May 2024, 16:16 UTC

A local attacker with low privileges can use a command injection vulnerability to gain root privileges due to improper input validation using the OCPP Remote service.

CVE-2024-28135 phoenixcontact vulnerability CVSS: 0 14 May 2024, 16:16 UTC

A low privileged remote attacker can use a command injection vulnerability in the API which performs remote code execution as the user-app user due to improper input validation. The confidentiality is partly affected.

CVE-2024-28134 phoenixcontact vulnerability CVSS: 0 14 May 2024, 16:16 UTC

An unauthenticated remote attacker can extract a session token with a MitM attack and gain web-based management access with the privileges of the currently logged in user due to cleartext transmission of sensitive information. No additional user interaction is required. The access is limited as only non-sensitive information can be obtained but the availability can be seriously affected. 

CVE-2024-28133 phoenixcontact vulnerability CVSS: 0 14 May 2024, 16:16 UTC

A local low privileged attacker can use an untrusted search path in a CHARX system utility to gain root privileges. 

CVE-2024-26288 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can influence the communication due to the lack of encryption of sensitive data via a MITM. Charging is not affected.

CVE-2024-26005 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can gain service level privileges through an incomplete cleanup during service restart after a DoS. 

CVE-2024-26004 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can DoS a control agent due to access of a uninitialized pointer which may prevent or disrupt the charging functionality.

CVE-2024-26003 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can DoS the control agent due to a out-of-bounds read which may prevent or disrupt the charging functionality. 

CVE-2024-26002 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An improper input validation in the Qualcom plctool allows a local attacker with low privileges to gain root access by changing the ownership of specific files.

CVE-2024-26001 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can write memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

CVE-2024-26000 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can read memory out of bounds due to improper input validation in the MQTT stack. The brute force attack is not always successful because of memory randomization.

CVE-2024-25999 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated local attacker can perform a privilege escalation due to improper input validation in the OCPP agent service. 

CVE-2024-25998 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can perform a command injection in the OCPP Service with limited privileges due to improper input validation.

CVE-2024-25997 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can perform a log injection due to improper input validation. Only a certain log file is affected.

CVE-2024-25996 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can perform a remote code execution due to an origin validation error. The access is limited to the service user.

CVE-2024-25995 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can modify configurations to perform a remote code execution, gain root rights or perform an DoS due to improper input validation.

CVE-2024-25994 phoenixcontact vulnerability CVSS: 0 12 Mar 2024, 09:15 UTC

An unauthenticated remote attacker can upload a arbitrary script file due to improper input validation. The upload destination is fixed and is write only.

CVE-2023-5592 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to download and execute applications without integrity checks on the device which may result in a complete loss of integrity.

CVE-2023-46144 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

A download of code without integrity check vulnerability in PLCnext products allows an remote attacker with low privileges to compromise integrity on the affected engineering station and the connected devices.

CVE-2023-46143 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

Download of Code Without Integrity Check vulnerability in PHOENIX CONTACT classic line PLCs allows an unauthenticated remote attacker to modify some or all applications on a PLC.

CVE-2023-46142 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

A incorrect permission assignment for critical resource vulnerability in PLCnext products allows an remote attacker with low privileges to gain full access on the affected devices.

CVE-2023-46141 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

Incorrect Permission Assignment for Critical Resource vulnerability in multiple products of the PHOENIX CONTACT classic line allow an remote unauthenticated attacker to gain full access of the affected device.

CVE-2023-0757 phoenixcontact vulnerability CVSS: 0 14 Dec 2023, 14:15 UTC

Incorrect Permission Assignment for Critical Resource vulnerability in PHOENIX CONTACT MULTIPROG, PHOENIX CONTACT ProConOS eCLR (SDK) allows an unauthenticated remote attacker to upload arbitrary malicious code and gain full access on the affected device.

CVE-2023-3935 phoenixcontact vulnerability CVSS: 0 13 Sep 2023, 14:15 UTC

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.

CVE-2023-3569 phoenixcontact vulnerability CVSS: 0 08 Aug 2023, 07:15 UTC

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an authenticated remote attacker with admin privileges could upload a crafted XML file which causes a denial-of-service.

CVE-2023-3526 phoenixcontact vulnerability CVSS: 0 08 Aug 2023, 07:15 UTC

In PHOENIX CONTACTs TC ROUTER and TC CLOUD CLIENT in versions prior to 2.07.2 as well as CLOUD CLIENT 1101T-TX/TX prior to 2.06.10 an unauthenticated remote attacker could use a reflective XSS within the license viewer page of the devices in order to execute code in the context of the user's browser.

CVE-2023-2673 phoenixcontact vulnerability CVSS: 0 13 Jun 2023, 07:15 UTC

Improper Input Validation vulnerability in PHOENIX CONTACT FL/TC MGUARD Family in multiple versions may allow UDP packets to bypass the filter rules and access the solely connected device behind the MGUARD which can be used for flooding attacks.

CVE-2023-1109 phoenixcontact vulnerability CVSS: 0 17 Apr 2023, 08:15 UTC

In Phoenix Contacts ENERGY AXC PU Web service an authenticated restricted user of the web frontend can access, read, write and create files throughout the file system using specially crafted URLs via the upload and download functionality of the web service. This may lead to full control of the service.

CVE-2022-3737 phoenixcontact vulnerability CVSS: 0 15 Nov 2022, 11:15 UTC

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 memory can be read beyond the intended scope due to insufficient validation of input data. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

CVE-2022-3480 phoenixcontact vulnerability CVSS: 0 15 Nov 2022, 11:15 UTC

A remote, unauthenticated attacker could cause a denial-of-service of PHOENIX CONTACT FL MGUARD and TC MGUARD devices below version 8.9.0 by sending a larger number of unauthenticated HTTPS connections originating from different source IP’s. Configuring firewall limits for incoming connections cannot prevent the issue.

CVE-2022-3461 phoenixcontact vulnerability CVSS: 0 15 Nov 2022, 11:15 UTC

In PHOENIX CONTACT Automationworx Software Suite up to version 1.89 manipulated PC Worx or Config+ files could lead to a heap buffer overflow and a read access violation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities.

CVE-2021-34579 phoenixcontact vulnerability CVSS: 0 09 Nov 2022, 17:15 UTC

In Phoenix Contact: FL MGUARD DM version 1.12.0 and 1.13.0 access to the Apache web server being installed as part of the FL MGUARD DM on Microsoft Windows does not require login credentials even if configured during installation.Attackers with network access to the Apache web server can download and therefore read mGuard configuration profiles (“ATV profiles”). Such configuration profiles may contain sensitive information, e.g. private keys associated with IPsec VPN connections.

CVE-2022-31801 phoenixcontact vulnerability CVSS: 10.0 21 Jun 2022, 08:15 UTC

An unauthenticated, remote attacker could upload malicious logic to the devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

CVE-2022-31800 phoenixcontact vulnerability CVSS: 10.0 21 Jun 2022, 08:15 UTC

An unauthenticated, remote attacker could upload malicious logic to devices based on ProConOS/ProConOS eCLR in order to gain full control over the device.

CVE-2022-29898 phoenixcontact vulnerability CVSS: 9.0 11 May 2022, 15:15 UTC

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the configuration file uploader in the WebUI to execute arbitrary code with root privileges on the OS due to an improper validation of an integrity check value in all versions of the firmware.

CVE-2022-29897 phoenixcontact vulnerability CVSS: 9.0 11 May 2022, 15:15 UTC

On various RAD-ISM-900-EN-* devices by PHOENIX CONTACT an admin user could use the traceroute utility integrated in the WebUI to execute arbitrary code with root privileges on the OS due to an improper input validation in all versions of the firmware.

CVE-2022-22509 phoenixcontact vulnerability CVSS: 9.0 02 Feb 2022, 13:15 UTC

In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.

CVE-2021-34598 phoenixcontact vulnerability CVSS: 4.3 10 Nov 2021, 12:15 UTC

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 the remote logging functionality is impaired by the lack of memory release for data structures from syslog-ng when remote logging is active

CVE-2021-34582 phoenixcontact vulnerability CVSS: 3.5 10 Nov 2021, 12:15 UTC

In Phoenix Contact FL MGUARD 1102 and 1105 in Versions 1.4.0, 1.4.1 and 1.5.0 a user with high privileges can inject HTML code (XSS) through web-based management or the REST API with a manipulated certificate file.

CVE-2021-34597 phoenixcontact vulnerability CVSS: 6.8 04 Nov 2021, 10:15 UTC

Improper Input Validation vulnerability in PC Worx Automation Suite of Phoenix Contact up to version 1.88 could allow an attacker with a manipulated project file to unpack arbitrary files outside of the selected project directory.

CVE-2021-34570 phoenixcontact vulnerability CVSS: 7.8 27 Sep 2021, 09:15 UTC

Multiple Phoenix Contact PLCnext control devices in versions prior to 2021.0.5 LTS are prone to a DoS attack through special crafted JSON requests.

CVE-2021-33542 phoenixcontact vulnerability CVSS: 5.1 25 Jun 2021, 19:15 UTC

Phoenix Contact Classic Automation Worx Software Suite in Version 1.87 and below is affected by a remote code execution vulnerability. Manipulated PC Worx or Config+ projects could lead to a remote code execution when unallocated memory is freed because of incompletely initialized data. The attacker needs to get access to an original bus configuration file (*.bcp) to be able to manipulate data inside. After manipulation the attacker needs to exchange the original file by the manipulated one on the application programming workstation. Availability, integrity, or confidentiality of an application programming workstation might be compromised by attacks using these vulnerabilities. Automated systems in operation which were programmed with one of the above-mentioned products are not affected.

CVE-2021-33541 phoenixcontact vulnerability CVSS: 7.8 25 Jun 2021, 19:15 UTC

Phoenix Contact Classic Line Controllers ILC1x0 and ILC1x1 in all versions/variants are affected by a Denial-of-Service vulnerability. The communication protocols and device access do not feature authentication measures. Remote attackers can use specially crafted IP packets to cause a denial of service on the PLC's network communication module. A successful attack stops all network communication. To restore the network connectivity the device needs to be restarted. The automation task is not affected.

CVE-2021-33540 phoenixcontact vulnerability CVSS: 7.5 25 Jun 2021, 19:15 UTC

In certain devices of the Phoenix Contact AXL F BK and IL BK product families an undocumented password protected FTP access to the root directory exists.

CVE-2021-21005 phoenixcontact vulnerability CVSS: 7.8 25 Jun 2021, 19:15 UTC

In Phoenix Contact FL SWITCH SMCS series products in multiple versions if an attacker sends a hand-crafted TCP-Packet with the Urgent-Flag set and the Urgent-Pointer set to 0, the network stack will crash. The device needs to be rebooted afterwards.

CVE-2021-21004 phoenixcontact vulnerability CVSS: 4.3 25 Jun 2021, 19:15 UTC

In Phoenix Contact FL SWITCH SMCS series products in multiple versions an attacker may insert malicious code via LLDP frames into the web-based management which could then be executed by the client.

CVE-2021-21003 phoenixcontact vulnerability CVSS: 5.0 25 Jun 2021, 19:15 UTC

In Phoenix Contact FL SWITCH SMCS series products in multiple versions fragmented TCP-Packets may cause a Denial of Service of Web-, SNMP- and ICMP-Echo services. The switching functionality of the device is not affected.

CVE-2020-12523 phoenixcontact vulnerability CVSS: 6.4 17 Dec 2020, 23:15 UTC

On Phoenix Contact mGuard Devices versions before 8.8.3 LAN ports get functional after reboot even if they are disabled in the device configuration. For mGuard devices with integrated switch on the LAN side, single switch ports can be disabled by device configuration. After a reboot these ports get functional independent from their configuration setting: Missing Initialization of Resource

CVE-2020-12524 phoenixcontact vulnerability CVSS: 5.0 02 Dec 2020, 15:15 UTC

Uncontrolled Resource Consumption can be exploited to cause the Phoenix Contact HMIs BTP 2043W, BTP 2070W and BTP 2102W in all versions to become unresponsive and not accurately update the display content (Denial of Service).

CVE-2020-12499 phoenixcontact vulnerability CVSS: 4.4 21 Jul 2020, 15:15 UTC

In PHOENIX CONTACT PLCnext Engineer version 2020.3.1 and earlier an improper path sanitation vulnerability exists on import of project files.

CVE-2020-12498 phoenixcontact vulnerability CVSS: 6.8 01 Jul 2020, 16:15 UTC

mwe file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier is vulnerable to out-of-bounds read remote code execution. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

CVE-2020-12497 phoenixcontact vulnerability CVSS: 6.8 01 Jul 2020, 16:15 UTC

PLCopen XML file parsing in Phoenix Contact PC Worx and PC Worx Express version 1.87 and earlier can lead to a stack-based overflow. Manipulated PC Worx projects could lead to a remote code execution due to insufficient input data validation.

CVE-2020-10940 phoenixcontact vulnerability CVSS: 4.6 27 Mar 2020, 21:15 UTC

Local Privilege Escalation can occur in PHOENIX CONTACT PORTICO SERVER through 3.0.7 when installed to run as a service.

CVE-2020-10939 phoenixcontact vulnerability CVSS: 4.6 27 Mar 2020, 20:15 UTC

Insecure, default path permissions in PHOENIX CONTACT PC WORX SRT through 1.14 allow for local privilege escalation.

CVE-2020-9436 phoenixcontact vulnerability CVSS: 9.0 12 Mar 2020, 14:15 UTC

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices allow authenticated users to inject system commands through a modified POST request to a specific URL.

CVE-2020-9435 phoenixcontact vulnerability CVSS: 5.0 12 Mar 2020, 14:15 UTC

PHOENIX CONTACT TC ROUTER 3002T-4G through 2.05.3, TC ROUTER 2002T-3G through 2.05.3, TC ROUTER 3002T-4G VZW through 2.05.3, TC ROUTER 3002T-4G ATT through 2.05.3, TC CLOUD CLIENT 1002-4G through 2.03.17, and TC CLOUD CLIENT 1002-TXTX through 1.03.17 devices contain a hardcoded certificate (and key) that is used by default for web-based services on the device. Impersonation, man-in-the-middle, or passive decryption attacks are possible if the generic certificate is not replaced by a device-specific certificate during installation.

CVE-2018-16994 phoenixcontact vulnerability CVSS: 7.8 18 Feb 2020, 23:15 UTC

An issue was discovered on PHOENIX CONTACT AXL F BK PN <=1.0.4, AXL F BK ETH <= 1.12, and AXL F BK ETH XC <= 1.11 devices and Bosch Rexroth S20-ETH-BK and Rexroth S20-PN-BK+ (the S20-PN-BK+/S20-ETH-BK fieldbus couplers sold by Bosch Rexroth contain technology from Phoenix Contact). Incorrect handling of a request with non-standard symbols allows remote attackers to initiate a complete lock up of the bus coupler. Authentication of the request is not required.

CVE-2019-16675 phoenixcontact vulnerability CVSS: 6.8 31 Oct 2019, 22:15 UTC

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.

CVE-2019-12870 phoenixcontact vulnerability CVSS: 6.8 24 Jun 2019, 16:15 UTC

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Uninitialized Pointer and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

CVE-2019-12869 phoenixcontact vulnerability CVSS: 6.8 24 Jun 2019, 16:15 UTC

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-Of-Bounds Read, Information Disclosure, and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

CVE-2019-12871 phoenixcontact vulnerability CVSS: 6.8 24 Jun 2019, 15:15 UTC

An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to a Use-After-Free and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project file to be able to manipulate it. After manipulation, the attacker needs to exchange the original file with the manipulated one on the application programming workstation.

CVE-2019-10998 phoenixcontact vulnerability CVSS: 4.6 18 Jun 2019, 13:15 UTC

An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Unlimited physical access to the PLC may lead to a manipulation of SD cards data. SD card manipulation may lead to an authentication bypass opportunity.

CVE-2019-10997 phoenixcontact vulnerability CVSS: 7.1 17 Jun 2019, 18:15 UTC

An issue was discovered on Phoenix Contact AXC F 2152 (No.2404267) before 2019.0 LTS and AXC F 2152 STARTERKIT (No.1046568) before 2019.0 LTS devices. Protocol Fuzzing on PC WORX Engineer by a man in the middle attacker stops the PLC service. The device must be rebooted, or the PLC service must be restarted manually via a Linux shell.

CVE-2018-13994 phoenixcontact vulnerability CVSS: 5.0 07 May 2019, 18:29 UTC

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is vulnerable to a denial-of-service attack by making more than 120 connections.

CVE-2018-13993 phoenixcontact vulnerability CVSS: 6.8 07 May 2019, 18:29 UTC

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 is prone to CSRF.

CVE-2018-13992 phoenixcontact vulnerability CVSS: 5.0 07 May 2019, 18:29 UTC

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 allows for plaintext transmission (HTTP) of user credentials by default.

CVE-2018-13991 phoenixcontact vulnerability CVSS: 5.0 07 May 2019, 18:29 UTC

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions 1.0 to 1.34 leaks private information in firmware images.

CVE-2018-13990 phoenixcontact vulnerability CVSS: 5.0 06 May 2019, 19:29 UTC

The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.

CVE-2019-10953 phoenixcontact vulnerability CVSS: 5.0 17 Apr 2019, 15:29 UTC

ABB, Phoenix Contact, Schneider Electric, Siemens, WAGO - Programmable Logic Controllers, multiple versions. Researchers have found some controllers are susceptible to a denial-of-service attack due to a flood of network packets.

CVE-2019-9744 phoenixcontact vulnerability CVSS: 6.8 26 Mar 2019, 20:29 UTC

An issue was discovered on PHOENIX CONTACT FL NAT SMCS 8TX, FL NAT SMN 8TX, FL NAT SMN 8TX-M, and FL NAT SMN 8TX-M-DMG devices. There is unauthorized access to the WEB-UI by attackers arriving from the same source IP address as an authenticated user, because this IP address is used as a session identifier.

CVE-2019-9743 phoenixcontact vulnerability CVSS: 9.0 26 Mar 2019, 20:29 UTC

An issue was discovered on PHOENIX CONTACT RAD-80211-XD and RAD-80211-XD/HP-BUS devices. Command injection can occur in the WebHMI component.

CVE-2019-9201 phoenixcontact vulnerability CVSS: 9.0 26 Feb 2019, 23:29 UTC

Multiple Phoenix Contact devices allow remote attackers to establish TCP sessions to port 1962 and obtain sensitive information or make changes, as demonstrated by using the Create Backup feature to traverse all directories.

CVE-2018-10731 phoenixcontact vulnerability CVSS: 9.3 17 May 2018, 19:29 UTC

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows when handling very large cookies (a different vulnerability than CVE-2018-10728).

CVE-2018-10730 phoenixcontact vulnerability CVSS: 9.0 17 May 2018, 19:29 UTC

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to OS command injection.

CVE-2018-10729 phoenixcontact vulnerability CVSS: 5.0 17 May 2018, 19:29 UTC

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 allow reading the configuration file by an unauthenticated user.

CVE-2018-10728 phoenixcontact vulnerability CVSS: 6.8 17 May 2018, 19:29 UTC

All Phoenix Contact managed FL SWITCH 3xxx, 4xxx, 48xx products running firmware version 1.0 to 1.33 are prone to buffer overflows (a different vulnerability than CVE-2018-10731).

CVE-2016-8380 phoenixcontact vulnerability CVSS: 7.5 05 Apr 2018, 16:29 UTC

The web server in Phoenix Contact ILC PLCs allows access to read and write PLC variables without authentication.

CVE-2016-8371 phoenixcontact vulnerability CVSS: 7.5 05 Apr 2018, 16:29 UTC

The web server in Phoenix Contact ILC PLCs can be accessed without authenticating even if the authentication mechanism is enabled.

CVE-2016-8366 phoenixcontact vulnerability CVSS: 5.0 05 Apr 2018, 16:29 UTC

Webvisit in Phoenix Contact ILC PLCs offers a password macro to protect HMI pages on the PLC against casual or coincidental opening of HMI pages by the user. The password macro can be configured in a way that the password is stored and transferred in clear text.

CVE-2018-5441 phoenixcontact vulnerability CVSS: 4.6 30 Jan 2018, 20:29 UTC

An Improper Validation of Integrity Check Value issue was discovered in PHOENIX CONTACT mGuard firmware versions 7.2 to 8.6.0. mGuard devices rely on internal checksums for verification of the internal integrity of the update packages. Verification may not always be performed correctly, allowing an attacker to modify firmware update packages.

CVE-2017-16743 phoenixcontact vulnerability CVSS: 10.0 12 Jan 2018, 20:29 UTC

An Improper Authorization issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to craft special HTTP requests allowing an attacker to bypass web-service authentication allowing the attacker to obtain administrative privileges on the device.

CVE-2017-16741 phoenixcontact vulnerability CVSS: 5.0 12 Jan 2018, 20:29 UTC

An Information Exposure issue was discovered in PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, and 48xxx Series products running firmware Version 1.0 to 1.32. A remote unauthenticated attacker may be able to use Monitor Mode on the device to read diagnostic information.

CVE-2017-5753 phoenixcontact vulnerability CVSS: 4.7 04 Jan 2018, 13:29 UTC

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVE-2017-16723 phoenixcontact vulnerability CVSS: 4.3 11 Dec 2017, 16:29 UTC

A Cross-site Scripting issue was discovered in PHOENIX CONTACT FL COMSERVER BASIC 232/422/485, FL COMSERVER UNI 232/422/485, FL COMSERVER BAS 232/422/485-T, FL COMSERVER UNI 232/422/485-T, FL COM SERVER RS232, FL COM SERVER RS485, and PSI-MODEM/ETH (running firmware versions prior to 1.99, 2.20, or 2.40). The cross-site scripting vulnerability has been identified, which may allow remote code execution.

CVE-2017-10198 phoenixcontact vulnerability CVSS: 4.3 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 6.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N).

CVE-2017-10176 phoenixcontact vulnerability CVSS: 5.0 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVE-2017-10135 phoenixcontact vulnerability CVSS: 4.3 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVE-2017-10118 phoenixcontact vulnerability CVSS: 5.0 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVE-2017-10116 phoenixcontact vulnerability CVSS: 5.1 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).

CVE-2017-10115 phoenixcontact vulnerability CVSS: 5.0 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).

CVE-2017-10108 phoenixcontact vulnerability CVSS: 5.0 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

CVE-2017-10102 phoenixcontact vulnerability CVSS: 6.8 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 9.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

CVE-2017-10078 phoenixcontact vulnerability CVSS: 5.5 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Scripting). The supported version that is affected is Java SE: 8u131. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data as well as unauthorized access to critical data or complete access to all Java SE accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

CVE-2017-10053 phoenixcontact vulnerability CVSS: 5.0 08 Aug 2017, 15:29 UTC

Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: 2D). Supported versions that are affected are Java SE: 6u151, 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).

CVE-2017-5159 phoenixcontact vulnerability CVSS: 7.5 13 Feb 2017, 21:59 UTC

An issue was discovered on Phoenix Contact mGuard devices that have been updated to Version 8.4.0. When updating an mGuard device to Version 8.4.0 via the update-upload facility, the update will succeed, but it will reset the password of the admin user to its default value.

CVE-2008-7199 phoenixcontact vulnerability CVSS: 5.0 10 Sep 2009, 10:30 UTC

Phoenix Contact FL IL 24 BK-PAC allows remote attackers to cause a denial of service (hang) via (1) unspecified manipulations as demonstrated by a Nessus scan or (2) malformed input to TCP port 502.