Phoenix Contact Automation Worx Software Suite
Phoenix Contact Automation Worx Software Suite (PC Worx and PC Worx Express versions 1.87 and earlier) contains a buffer overflow vulnerability (CWE-121) and out-of-bounds read vulnerability (CWE-125) in project file parsing. Successful exploitation allows arbitrary code execution under the privileges of the application. The vulnerability is triggered when a user opens a specially crafted project file. These vulnerabilities are not remotely exploitable and require local file handling. Phoenix Contact has announced that the next version will implement improved input validation for file size and object references, but no fixed version is currently available.
- User must open a malicious project file in PC Worx or PC Worx Express
- File delivery method (email, USB, file share)
- No special network access required—this is a local file handling vulnerability
/api/v1/advisories/aac728db-bc7e-43e9-b0d1-a159198d4b90Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.