Phoenix Contact: Multiple vulnerabilities in WP 6xxx Web panels
Multiple critical vulnerabilities in Phoenix Contact WP 6xxx web panels allow unauthenticated attackers to read arbitrary files from the device, inject and execute arbitrary commands, and bypass authentication or access control mechanisms. The vulnerabilities stem from hardcoded session and encryption keys, missing firmware update signature verification, insufficient access controls, and a service running with unnecessary elevated privileges. All WP 6xxx models (WP 6070-WVPS, WP 6101-WXPS, WP 6121-WXPS, WP 6156-WHPS, WP 6185-WHPS, WP 6215-WHPS) with firmware versions prior to 4.0.10 are affected.
- Network access to the WP 6xxx device's web interface (port 80/443 typical)
- No authentication required to exploit most vulnerabilities
- Device running firmware version prior to 4.0.10
Patching may require device reboot — plan for process interruption
/api/v1/advisories/56089729-a41d-4bc9-9aaa-51966829c2e6Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.