PHOENIX CONTACT: Security Advisory for Automation Worx Software Suite
Manipulated PC Worx or Config+ bus configuration (.bcp) project files can lead to remote code execution when the file is opened on an engineering workstation. The vulnerability exists because data structures are incompletely initialized in memory (CWE-824). An attacker must intercept or gain access to a legitimate .bcp file, modify it, and replace the original file on the engineering workstation. When an engineer opens the manipulated file, the uninitialized memory is freed, triggering code execution. No patch is currently available for PC Worx (≤1.87), PC Worx Express (≤1.87), or Config+ (≤1.87). The vendor has stated that a future version will initialize all affected data completely to prevent this issue.
- Access to a legitimate .bcp project file from the target organization
- Ability to modify and replace the file on the engineering workstation or in transit
- An engineer must open the manipulated file in PC Worx or Config+ (user interaction required)
Patching may require device reboot — plan for process interruption
/api/v1/advisories/8e95ad71-ca15-4c55-8e9b-665b01d673ac