PHOENIX CONTACT: Denial-of-Service vulnerabilty in Emalytics, ILC 2050 BI and ILC 2050 BI-L
A vulnerability exists in Phoenix Contact ILC 2050 BI, ILC 2050 BI-L hardware controllers and Emalytics Automation Workbench N4 software (versions 1.3.0 and earlier) in TLS handshake handling. A timeout during TLS connection negotiation can cause the connection to fail to terminate properly, leaving a Niagara thread in a hung state. This requires manual device restart to restore normal operation. The vulnerability is triggered by sending a malformed or stalled TLS connection attempt to the device's Ethernet port.
- Network access to the Ethernet port of the ILC 2050 BI or Emalytics workbench from the same network segment (AV:A means adjacent network)
- No authentication required to trigger the timeout condition
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8091b21b-c37e-4218-8063-d924ccce2a83Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.