Phoenix Contact: Automation Worx and classic line controllers prone to Incorrect Permission Assignment for Critical Resource
Phoenix Contact classic line industrial controllers lack code integrity and authenticity verification for application logic files. Logic files generated by Automation Worx can be modified on engineering workstations or intercepted during transmission and loaded into the PLC without tamper detection. Malicious code can be crafted to remain hidden while modifying process setpoints or disabling interlocks. No firmware patches are available. The controllers are designed for closed industrial networks and must be protected by multi-level security controls including firewalls, network segmentation, VPN for remote access, and restricted access to engineering tools.
- Network or physical access to an engineering workstation running Automation Worx software
- Ability to intercept or modify files in transit between engineering station and controller if not using VPN
- Access to the engineering tools or project files on the workstation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/54ab0ff7-b283-499b-b001-378d671b2e6cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.