PHOENIX CONTACT: Niche Ethernet Stack for ILC1x0, ILC1x1 and AXC 1050 Industrial controllers and CHARX control DC
Phoenix Contact Classic Line industrial controllers (ILC1x0, ILC1x1, AXC 1050, EV-PLCC-AC1-DC1) contain vulnerabilities in the third-party Niche Ethernet stack that can be exploited by remote attackers to cause denial of service or breach data integrity. The controllers lack authentication mechanisms in their communication protocols by design. Attackers can send specially crafted IP packets to trigger crashes or alter device data, potentially disrupting production. No firmware updates are available for any affected product version.
- Network access to the affected PLC on the same subnet or routable network segment
- No credentials required; vulnerability is unauthenticated
Patching may require device reboot — plan for process interruption
/api/v1/advisories/33380de0-b146-49a2-9680-bf9fa3f8e2adGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.