PHOENIX CONTACT: Security Advisory for PLCNext, SMARTRTU AXC, CHARX control modular and EEM-SB37x
A Time-of-Check-Time-of-Use (TOCTOU) vulnerability in Phoenix Contact firmware update mechanisms allows an attacker with access to the firmware file to replace it with malicious code after cryptographic validation but before installation is completed. This bypasses signature verification and allows installation of arbitrary firmware. The vulnerability affects PLCNext controllers (AXC F series), SMARTRTU AXC gateway devices, CHARX control modular units, RFC industrial routers, energy management devices (EEM-SB), and related Starterkit products used in energy and manufacturing automation.
- Access to the firmware update file during the update process (local file access or ability to intercept in-progress updates)
- Knowledge of device update mechanism and timing
- Ability to modify files on the device or in transit during the update window
Patching may require device reboot — plan for process interruption
/api/v1/advisories/73284d8f-2b0a-42b6-a56d-82a34b28b25cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.