PHOENIX CONTACT: DoS for PLCnext Control devices in versions <2021.0.5 LTS
A denial-of-service vulnerability exists in Phoenix Contact PLCnext Control devices. An attacker on the same network can send a specially crafted JSON request to the /auth/access-token endpoint, causing improper input validation (CWE-20) that crashes the device and forces an unplanned restart. Affected products include AXC F 1152, AXC F 2152, AXC F 2152 Starterkit, AXC F 3152, RFC 4072S, and PLCnext Technology Starterkit in all versions before 2021.0.5 LTS. The vulnerability has been updated to CVSS 9.1 reflecting its network-based exploitability and impact on device availability.
- Network access to the controller's Ethernet port or shared network segment
- Knowledge of the /auth/access-token endpoint
Patching may require device reboot — plan for process interruption
/api/v1/advisories/04433834-a87c-4315-b7b6-2309c77c8b38Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.