Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

phoenixcontact

About This Vendor

phoenixcontact is a technology vendor producing software and infrastructure products. As a software provider, phoenixcontact's broad product portfolio across multiple domains—including operating systems, cloud infrastructure, enterprise applications, databases, networking, and security tools—creates a large attack surface. Additionally, long support cycles, widespread deployment, and continuous feature development contribute to the accumulation of discovered vulnerabilities over time. Major vendors typically report higher CVE counts not necessarily due to inferior security, but because of greater exposure to security research, responsible disclosure practices, and the sheer complexity of maintaining multiple product lines and legacy systems. Regular security assessments and patching of phoenixcontact's products are critical for organizations running their software in production environments.

Vulnerability Trends for This Vendor

SecUtils has indexed 155 known vulnerabilities from phoenixcontact. This includes 18 critical-severity issues and 97 high-severity issues that represent significant risk. These vulnerabilities affect 1030 distinct products across phoenixcontact's portfolio, demonstrating the breadth of the vendor's product ecosystem and the importance of comprehensive patch management strategies. Disclosure dates span from 2009 through 2025, indicating decades of continuous security attention and research. Organizations deploying phoenixcontact products should maintain active vulnerability monitoring, prioritize critical patches, and implement compensating controls where patches cannot be applied immediately.

ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2008-7199 2009-09-10 2025-04-09 - 5.0 Likely
CVE-2017-5159 2017-02-13 2025-04-20 9.8 7.5 Likely
CVE-2017-10053 2017-08-08 2025-04-20 5.3 5.0 Likely
CVE-2017-10078 2017-08-08 2025-04-20 8.1 5.5 Likely
CVE-2017-10102 2017-08-08 2025-04-20 9.0 6.8 Likely
CVE-2017-10108 2017-08-08 2025-04-20 5.3 5.0 Likely
CVE-2017-10115 2017-08-08 2025-04-20 7.5 5.0 Likely
CVE-2017-10116 2017-08-08 2025-04-20 8.3 5.1 Unknown
CVE-2017-10118 2017-08-08 2025-04-20 7.5 5.0 Likely
CVE-2017-10135 2017-08-08 2025-04-20 5.9 4.3 Likely
CVE-2017-10176 2017-08-08 2025-04-20 7.5 5.0 Likely
CVE-2017-10198 2017-08-08 2025-04-20 6.8 4.3 Likely
CVE-2017-16723 2017-12-11 2025-04-20 6.1 4.3 Likely
CVE-2017-5753 2018-01-04 2025-01-14 5.6 4.7 Unknown
CVE-2017-16741 2018-01-12 2024-11-21 5.3 5.0 Likely
CVE-2017-16743 2018-01-12 2024-11-21 9.8 10.0 Likely
CVE-2018-5441 2018-01-30 2024-11-21 7.8 4.6 Unknown
CVE-2016-8366 2018-04-05 2024-11-21 7.3 5.0 Likely
CVE-2016-8371 2018-04-05 2024-11-21 7.3 7.5 Likely
CVE-2016-8380 2018-04-05 2024-11-21 7.3 7.5 Likely
CVE-2018-10728 2018-05-17 2024-11-21 8.1 6.8 Likely
CVE-2018-10729 2018-05-17 2024-11-21 5.3 5.0 Likely
CVE-2018-10730 2018-05-17 2024-11-21 9.1 9.0 Likely
CVE-2018-10731 2018-05-17 2024-11-21 9.0 9.3 Likely
CVE-2019-9201 2019-02-26 2024-11-21 9.8 9.0 Likely
CVE-2019-9743 2019-03-26 2024-11-21 8.8 9.0 Likely
CVE-2019-9744 2019-03-26 2024-11-21 8.8 6.8 Likely
CVE-2019-10953 2019-04-17 2024-11-21 7.5 5.0 Likely
CVE-2018-13990 2019-05-06 2024-11-21 8.6 5.0 Likely
CVE-2018-13991 2019-05-07 2024-11-21 5.3 5.0 Likely
CVE-2018-13992 2019-05-07 2024-11-21 8.2 5.0 Likely
CVE-2018-13993 2019-05-07 2024-11-21 8.8 6.8 Likely
CVE-2018-13994 2019-05-07 2024-11-21 7.5 5.0 Likely
CVE-2019-10997 2019-06-17 2024-11-21 5.9 7.1 Likely
CVE-2019-10998 2019-06-18 2024-11-21 6.8 4.6 Unknown
CVE-2019-12871 2019-06-24 2024-11-21 8.8 6.8 Likely
CVE-2019-12869 2019-06-24 2024-11-21 8.8 6.8 Likely
CVE-2019-12870 2019-06-24 2024-11-21 8.8 6.8 Likely
CVE-2019-16675 2019-10-31 2024-11-21 7.8 6.8 Likely
CVE-2020-8768 2020-02-17 2024-11-21 9.4 7.5 Likely
CVE-2019-18352 2020-02-18 2024-11-21 8.2 4.3 Unknown
CVE-2018-16994 2020-02-18 2024-11-21 7.5 7.8 Likely
CVE-2020-9435 2020-03-12 2024-11-21 7.5 5.0 Likely
CVE-2020-9436 2020-03-12 2024-11-21 8.8 9.0 Likely
CVE-2020-10939 2020-03-27 2024-11-21 7.8 4.6 Unknown
CVE-2020-10940 2020-03-27 2024-11-21 7.8 4.6 Unknown
CVE-2020-12497 2020-07-01 2024-11-21 7.8 6.8 Likely
CVE-2020-12498 2020-07-01 2024-11-21 7.8 6.8 Likely
CVE-2020-12499 2020-07-21 2024-11-21 8.2 4.4 Unknown
CVE-2020-12524 2020-12-02 2024-11-21 7.5 5.0 Likely
CVE-2020-12517 2020-12-17 2024-11-21 8.8 6.0 Unknown
CVE-2020-12518 2020-12-17 2024-11-21 5.5 5.0 Likely
CVE-2020-12519 2020-12-17 2024-11-21 8.8 10.0 Likely
CVE-2020-12521 2020-12-17 2024-11-21 6.5 6.1 Unknown
CVE-2020-12523 2020-12-17 2024-11-21 5.4 6.4 Likely
CVE-2021-21002 2021-06-25 2024-11-21 7.5 5.0 Likely
CVE-2021-21003 2021-06-25 2024-11-21 5.3 5.0 Likely
CVE-2021-21004 2021-06-25 2024-11-21 7.4 4.3 Likely
CVE-2021-21005 2021-06-25 2024-11-21 7.5 7.8 Likely
CVE-2021-33540 2021-06-25 2024-11-21 7.3 7.5 Likely
CVE-2021-33541 2021-06-25 2024-11-21 7.5 7.8 Likely
CVE-2021-33542 2021-06-25 2024-11-21 7.8 5.1 Unknown
CVE-2021-34570 2021-09-27 2024-11-21 7.5 7.8 Likely
CVE-2021-34597 2021-11-04 2024-11-21 7.8 6.8 Likely
CVE-2021-34582 2021-11-10 2024-11-21 4.8 3.5 Unknown
CVE-2021-34598 2021-11-10 2024-11-21 7.5 4.3 Likely
CVE-2022-22509 2022-02-02 2024-11-21 8.8 9.0 Likely
CVE-2022-29897 2022-05-11 2024-11-21 9.1 9.0 Likely
CVE-2022-29898 2022-05-11 2024-11-21 9.1 9.0 Likely
CVE-2022-31800 2022-06-21 2024-11-21 9.8 10.0 Likely
CVE-2022-31801 2022-06-21 2024-11-21 9.8 10.0 Likely
CVE-2021-34579 2022-11-09 2024-11-21 7.5 - -
CVE-2022-3461 2022-11-15 2024-11-21 7.8 - -
CVE-2022-3480 2022-11-15 2024-11-21 7.5 - -
CVE-2022-3737 2022-11-15 2024-11-21 7.8 - -
CVE-2023-1109 2023-04-17 2024-11-21 8.8 - -
CVE-2023-2673 2023-06-13 2024-11-21 5.3 - -
CVE-2023-3526 2023-08-08 2024-11-21 9.6 - -
CVE-2023-3569 2023-08-08 2024-11-21 4.9 - -
CVE-2023-3570 2023-08-08 2024-11-21 8.8 - -
CVE-2023-3571 2023-08-08 2024-11-21 8.8 - -
CVE-2023-3572 2023-08-08 2024-11-21 10.0 - -
CVE-2023-3573 2023-08-08 2024-11-21 8.8 - -
CVE-2023-37855 2023-08-09 2024-11-21 4.3 - -
CVE-2023-37856 2023-08-09 2024-11-21 4.3 - -
CVE-2023-37857 2023-08-09 2024-11-21 3.8 - -
CVE-2023-37858 2023-08-09 2024-11-21 4.9 - -
CVE-2023-37859 2023-08-09 2024-11-21 7.2 - -
CVE-2023-37860 2023-08-09 2024-11-21 7.5 - -
CVE-2023-37861 2023-08-09 2024-11-21 8.8 - -
CVE-2023-37862 2023-08-09 2024-11-21 8.2 - -
CVE-2023-37863 2023-08-09 2024-11-21 7.2 - -
CVE-2023-37864 2023-08-09 2024-11-21 7.2 - -
CVE-2023-3935 2023-09-13 2024-11-21 9.8 - -
CVE-2023-0757 2023-12-14 2024-11-21 9.8 - -
CVE-2023-46141 2023-12-14 2024-11-21 9.8 - -
CVE-2023-46142 2023-12-14 2024-11-21 8.8 - -
CVE-2023-46143 2023-12-14 2024-11-21 7.5 - -
CVE-2023-46144 2023-12-14 2024-11-21 6.5 - -
CVE-2023-5592 2023-12-14 2024-11-21 7.5 - -
CVE-2024-25994 2024-03-12 2025-01-24 5.3 - -
CVE-2024-25995 2024-03-12 2025-01-30 9.8 - -
CVE-2024-25996 2024-03-12 2025-01-23 5.3 - -
CVE-2024-25997 2024-03-12 2025-01-23 5.3 - -
CVE-2024-25998 2024-03-12 2025-01-24 7.3 - -
CVE-2024-25999 2024-03-12 2025-01-23 8.4 - -
CVE-2024-26000 2024-03-12 2025-01-24 5.9 - -
CVE-2024-26001 2024-03-12 2025-01-24 7.4 - -
CVE-2024-26002 2024-03-12 2025-01-23 7.8 - -
CVE-2024-26003 2024-03-12 2025-01-23 7.5 - -
CVE-2024-26004 2024-03-12 2025-01-23 7.5 - -
CVE-2024-26005 2024-03-12 2025-01-23 4.8 - -
CVE-2024-26288 2024-03-12 2025-01-23 8.7 - -
CVE-2024-28133 2024-05-14 2025-01-23 7.8 - -
CVE-2024-28134 2024-05-14 2025-01-23 7.0 - -
CVE-2024-28135 2024-05-14 2025-01-24 5.0 - -
CVE-2024-28136 2024-05-14 2025-01-24 7.8 - -
CVE-2024-28137 2024-05-14 2025-01-23 7.8 - -
CVE-2024-3913 2024-08-13 2025-01-29 5.9 - -
CVE-2024-6788 2024-08-13 2025-08-22 8.6 - -
CVE-2024-7734 2024-09-10 2024-09-28 5.3 - -
CVE-2024-43385 2024-09-10 2024-09-27 8.8 - -
CVE-2024-43386 2024-09-10 2024-09-27 8.8 - -
CVE-2024-43387 2024-09-10 2024-09-27 8.8 - -
CVE-2024-43388 2024-09-10 2025-08-22 8.8 - -
CVE-2024-43389 2024-09-10 2025-08-22 8.1 - -
CVE-2024-43390 2024-09-10 2025-08-22 8.1 - -
CVE-2024-43391 2024-09-10 2025-08-22 8.1 - -
CVE-2024-43392 2024-09-10 2025-08-22 8.1 - -
CVE-2024-43393 2024-09-10 2025-08-22 8.1 - -
CVE-2024-7698 2024-09-10 2025-08-22 5.7 - -
CVE-2024-7699 2024-09-10 2024-09-27 8.8 - -
CVE-2025-24002 2025-07-08 2025-07-11 5.3 - -
CVE-2025-24003 2025-07-08 2025-07-11 8.2 - -
CVE-2025-24004 2025-07-08 2025-07-11 5.2 - -
CVE-2025-24005 2025-07-08 2025-07-11 7.8 - -
CVE-2025-24006 2025-07-08 2025-07-11 7.8 - -
CVE-2025-25268 2025-07-08 2025-07-11 8.8 - -
CVE-2025-25269 2025-07-08 2025-07-11 8.4 - -
CVE-2025-25270 2025-07-08 2025-07-11 9.8 - -
CVE-2025-25271 2025-07-08 2025-07-11 8.8 - -
CVE-2025-41692 2025-12-09 2025-12-19 6.8 - -
CVE-2025-41693 2025-12-09 2025-12-19 4.3 - -
CVE-2025-41694 2025-12-09 2025-12-19 6.5 - -
CVE-2025-41695 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41696 2025-12-09 2025-12-19 4.6 - -
CVE-2025-41697 2025-12-09 2025-12-19 6.8 - -
CVE-2025-41745 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41746 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41747 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41748 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41749 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41750 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41751 2025-12-09 2025-12-19 7.1 - -
CVE-2025-41752 2025-12-09 2025-12-19 7.1 - -

How SecUtils Normalizes Vendor Data

SecUtils aggregates National Vulnerability Database (NVD) and MITRE records for phoenixcontact by normalizing vendor identifiers across diverse data sources, mapping vendor names to their associated product lines, and collecting all known vulnerabilities under a unified vendor context. For every CVE associated with phoenixcontact's products, we extract and structure Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) categories, CVSS severity metrics, and reference links to enable rapid vulnerability identification and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and vendor vulnerability tracking.