Phoenix Contact Automation Worx
Phoenix Contact Automation Worx Software Suite versions 1.89 and earlier contain heap buffer overflow and read access violation vulnerabilities in how the applications parse project files. These are triggered when a user opens a malicious project file, leading to potential code execution with user-level privileges on the affected workstation. The vulnerabilities affect Config+, PC Worx, and PC Worx Express components. No public exploits are currently known, and the vulnerabilities are not remotely exploitable; they require a user to open a crafted file.
- User must open a malicious project file in one of the affected Automation Worx applications
- Affected versions: Automation Worx Software Suite Config+ version 1.89 or earlier, PC Worx version 1.89 or earlier, or PC Worx Express version 1.89 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/12893321-16b1-4b7f-8759-061bbd3059e1Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.