ICSA-20-063-02_PHOENIX CONTACT Emalytics Controller ILC
Phoenix Contact ILC 2050 controllers (both BI and BI-L models) contain a file permission vulnerability (CWE-732) that allows unauthenticated remote code execution over the network. The vulnerability affects all firmware versions prior to 1.2.3. An attacker can gain arbitrary code execution on the controller without requiring any credentials or user interaction, potentially leading to complete compromise of the device and the processes it controls. Phoenix Contact has released updated Emalytics engineering software (v1.2.3 or higher) that must be deployed and the controllers recommissioned to remediate the issue.
- Network access to the ILC 2050 controller on its management or control port
- ILC 2050 running firmware version 1.2.2 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/192b5159-c61d-4c51-8f80-bacf43ac5204Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.