An issue was discovered in PHOENIX CONTACT PC Worx through 1.86, PC Worx Express through 1.86, and Config+ through 1.86. A manipulated PC Worx or Config+ project file could lead to an Out-of-bounds Read and remote code execution. The attacker needs to get access to an original PC Worx or Config+ project to be able to manipulate data inside. After manipulation, the attacker needs to exchange the original files with the manipulated ones on the application programming workstation.
2019-10-31T22:15:10.567
2024-11-21T04:30:57.417
Modified
CVSSv3.1: 7.8 (HIGH)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | phoenixcontact | config\+ | ≤ 1.86 | Yes |
Application | phoenixcontact | pc_worx | ≤ 1.86 | Yes |
Application | phoenixcontact | pc_worx_express | ≤ 1.86 | Yes |