PHOENIX CONTACT Automation Worx Software Suite
A vulnerability in Phoenix Contact Automation Worx Software Suite (PC Worx, PC Worx Express, and Config+ versions 1.86 and earlier) allows improper validation of project file input data, specifically arrays with invalid dimensions. Opening a malicious project file could allow an attacker to execute arbitrary code on the engineering workstation. While the running automation systems themselves are not directly affected, an attacker could modify automation logic, steal credentials, or plant backdoors in legitimate programs before deployment. The vulnerability is triggered by user interaction (opening a file) and requires social engineering or file delivery via email or file-sharing services.
- Project file must be opened in one of the affected PC Worx products (versions 1.86 or earlier)
- User interaction required: engineer must explicitly open a malicious project file
- Access to deliver file via email, file-sharing service, or removable media to an authorized user
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3896af72-3b05-4acf-a1dc-402873476948