PHOENIX CONTACT: Multiple Linux component vulnerabilities fixed in latest AXC F x152 LTS release
Phoenix Contact AXC F x152 controllers contain multiple vulnerabilities in third-party Linux kernel components and libraries integrated into the firmware. The vulnerabilities include buffer overflows (CWE-120, CWE-787), null pointer dereferences (CWE-476), integer overflows (CWE-190), missing authentication checks (CWE-306), and improper input validation (CWE-20). These affect AXC F 1152, AXC F 2152, AXC F 3152, and RFC 4072 devices running firmware versions prior to 2022.0.3 LTS (AXC F 1152/2152) or 2022.0.5 LTS (AXC F 3152/RFC 4072). The vulnerabilities were addressed through updates to integrated third-party libraries and SDKs in the LTS firmware releases.
- Network-level access to the AXC F x152 controller (Ethernet)
- Device must be running a firmware version prior to 2022.0.3 LTS (AXC F 1152/2152) or 2022.0.5 LTS (AXC F 3152/RFC 4072)
- No authentication required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/9665af36-7b11-470c-b86e-628327f06cd6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.