PHOENIX CONTACT PLCNext AXC F 2152
The AXC F 2152 controller contains multiple critical vulnerabilities spanning weak encryption (CWE-326), authentication bypass (CWE-287, CWE-284), buffer overflows (CWE-787, CWE-119), and input validation flaws (CWE-20). These flaws allow an attacker with network access to decrypt stored passwords, bypass authentication, cause denial of service, and potentially trigger unintended interactions with third-party systems. Vulnerabilities also relate to improper SD card handling and insecure OPC security policies (CWE-295, CWE-327). Version 1.x has no fix available from the vendor.
- Network access to the AXC F 2152 controller on port 502 (Modbus) or OPC server ports
- Default or weak OPC security policy (Basic128Rsa15) enabled on the device
- SD card containing sensitive data accessible to the attacker
Patching may require device reboot — plan for process interruption
/api/v1/advisories/29243497-cf39-40ca-9d0d-fef3d74a0f04Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.