Festo CPX-CEC-C1 and CPX-CMXX
Unauthenticated access to critical webpage functions on Festo CPX-CEC-C1 and CPX-CMXX control blocks allows an attacker to trigger a device reboot without authentication, causing denial of service. The vulnerability affects CPX-CEC-C1 versions up to 2.0.12, CPX-CMXX up to 1.2.34_rev.404, and CPX-CEC-C1 control block SET up to 1.2.34_rev.404. Festo has not released patches for these products and recommends network isolation, firewall protection, VPN for remote access, and activation of user management and password features as compensating controls.
- Network access to the CPX controller's HTTP/HTTPS port (80/443)
- No credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/6361ce12-7624-43a6-8f7b-83f4b6305df9Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.