PHOENIX CONTACT: Multiple Vulnerabilities in PLCnext Firmware
Phoenix Contact PLCnext controllers contain multiple critical vulnerabilities in firmware versions before 2023.0.0 LTS, including buffer overflows (CWE-787, CWE-121), use-after-free flaws (CWE-416), path traversal (CWE-22), and weak cryptography (CWE-327, CWE-319) stemming from vulnerable open-source libraries. The Web-Based Management (WBM) interface is susceptible to cross-site scripting attacks, and the HMI is vulnerable to denial-of-service and memory leak attacks. The User Manager component has hardening gaps in the Trust and Identity Stores and improper password validation. Remote attackers can exploit these over the network without authentication to achieve remote code execution, cause denial of service, or extract sensitive data from the controller's memory.
- Network access to the PLCnext controller (Ethernet port 80/443 or other exposed services)
- No valid credentials required for exploitation of network-facing services
- Device must be running affected firmware versions before 2023.0.0 LTS
Patching may require device reboot — plan for process interruption
/api/v1/advisories/ed3a28a6-3c68-4b34-b723-8fdd42e2a979