PHOENIX CONTACT: Path Traversal in Library of PLCnext Technology Toolchain and FL Network Manager
A path traversal vulnerability exists in SharpZipLib, a TAR/ZIP extraction library used by Phoenix Contact's PLCnext Technology toolchain and FL Network Manager. Versions prior to SharpZipLib 1.3.3 allow crafted TAR or ZIP files with directory traversal sequences (../evil.txt) to extract files outside their intended directory. This enables arbitrary file write on the host system, potentially leading to code execution. PLCnext Technology toolchain for Windows versions prior to 2022.0 LTS and FL Network Manager versions prior to 6.0.1 are affected.
- User must extract or import a malicious TAR/ZIP file via PLCnext Technology toolchain or FL Network Manager
- Affected version of toolchain or FL Network Manager must be installed on the system
- No authentication required; exploitation occurs during normal file extraction operation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f9ceba12-595f-464c-a1a5-214f63a8d868Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.